CompTIA Linux+ Questions&Answers | Secure Shell | File Transfer Protocol

Exam Name: Exam Type: Exam Code

:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 1 On an NIS client, the following is a portion of the output of cat /etc/passwd: +Joe:::::::: +Sam:::::::: +:*::::::::/bin/false Which of the following is true for all users other than Joe and Sam? A. They have full access. B. They are denied access. C. They are granted limited access. D. They gain access after being prompted for a shell. Answer: B Question: 2 How can a user view an X Window from a remote system on their local system? A. from the local system: export DISPLAY=local:0.0 B. from the remote system: export DISPLAY=local:0.0 C. from the local system: export DISPLAY=remote:0.0 D. from the remote system: export DISPLAY=remote:0.0 Answer: B Question: 3 Which of the following commands can be used to confirm that the FTP server is listening? A. netstat -a ftp B. netstat | grep ftp C. netstat -u | grep ftp D. netstat -a | grep ftp Answer: D Explanation: -a Display all connections and listening ports Question: 4 When a RAID 5 array is configured with a hot-spare disk under Linux, which of the following is the minimum number of drives required? A. 2 B. 3 C. 4 D. 5 Answer: C
Page 1 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: Raid 5 requires 3 disks. Hotspare 1. Question: 5 A system administrator wants to see if an RPM package is installed on a user workstation. Which of the following commands should be used? A. rpm -query <filename> B. rpmfind <name of package> C. rpm -qa | grep <name of package> D. find -name rpm | grep <filename> Answer: C Explanation: -q query, -a lists all installed packages Question: 6 Which of the following can be used to determine who has scheduled a job? A. who B. whodo C. at -d D. at -l Answer: D Question: 7 Which of the following encryption schemes is the LEAST secure? A. DES B. MD5 C. AES D. Blowfish Answer: A Explanation: The Data Encryption Standard, a block cipher with 64-bit blocks and a 56-bit key Like MD4, it produces a 128-bit hash. For details see RFC 1321 AES ciphers use a 128-bit block and 128, 192 or 256-bit keys A block cipher using 64-bit blocks and keys of up to 448 bits Question: 8 A Linux machine has a local address of 192.168.1.1 with subnet mask of 255.255.255.0. All services are currently denied. Which of the following lines should be appended to hosts.allow file to permit access to the Web service on the local subnet. A. httpd: 192.168.1.0/24 B. ALL: 192.168.1.255/24 C. ALL except httpd: 192.168.1.1/24 D. 192.168.1.255/255.255.255.0:httpd Answer: A
Page 2 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: To permit access to the Web service, you need to permit access to the HTTP daemon (httpd). You then need to specify which IP addresses can access it. 192.168.1.0 is the network address of a host with an IP address of 192.168.1.1. The statement 'httpd: 192.168.1.' (without the 0) will allow all machines in the 192.168.1.0 subnet access to the Web service. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 364. Incorrect Answers: B. The ALL statement is invalid. It can only be used in the client list to mean 'all' IP addresses. C. The ALL statement is invalid. It can only be used in the client list to mean 'all' IP addresses. D. The server service come before the client list. Question: 9 A Linux administrator is about to install a Linux server. The server has 256MB of RAM. Which of the following sizes of the swap partition is generally recommended? A. 128MB B. 256MB C. 512MB D. 1024MB Answer: C Explanation: swap partitions are used to support virtual memory. In other words, data is written to a swap partition when there is not enough RAM to store the data your system is processing. If you are unsure about what size swap partition to create, make it twice the amount of RAM on your machine (but no larger than 2 GB). It must be of type swap. Question: 10 Which driver, if any, is required to support L3 cache on the system processor? A. msr.o B. mtrr.o C. cache.o D. No driver is required. Answer: D Question: 11 A user wants to remotely connect to a Linux system to transfer files from an oversea IP address. Which of the following programs allows the user to do this securely? A. rcp B. ftp C. sftp D. Telnet Answer: C Explanation: sftp = secure ftp
Page 3 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 12 When the command mke2fs -j is run, what type of system is created? A. ext2 B. ext3 C. jfs D. xfs Answer: B Explanation: Simply run mke2fs -j /dev/hdXX to create a new ext3 filesystem on that device. Question: 13 In addition to selected packages and partition maps, which of the following should also be documented during a Linux server installation? A. System hardware and user passwords B. Root password and performance baseline C. Daemon configuration and performance baseline D. System hardware and daemon configuration Answer: D Question: 14 Which of the following commands can be run to determine which package owns /etc/exports? A. rpm -qf /etc/exports B. rpm -ql /etc/exports C. rpm --file /etc/exports D. rpm --verify /etc/exports Answer: A Explanation: -q = query, -f = Lists the package that owns the specified file. Question: 15 The rot user types 'echo $PATH' and sees the following output: .:/bin:/usr/bin:/sbin:/usr/X11R6/bin:/usr/src Which of the following parts of this path is considered to be a security risk? A. . B. /sbin C. /usr/src D. /usr/X11R6/bin Answer: A Explanation: A common mistake in the past (?) was to keep '.' in the root's path. Malicious hacker makes program 'ls' in his home directory. If root makes
Page 4 of 217

password=mywindowspassword mount -t smbf \\servername\sharename /mountdirectory -o username=mywindowsusername. B. Run chkdsk on the . Question: 19 Page 5 of 217 . Verify the checksum match for the . password=mywindowspassword smbmount -t smbfs //servername/sharename /mountdirectory -o username=mywindowsusername. Run /sbin/verify_iso B. D. smbmount //servername/sharename /mountdirectory -o username=mywindowsusername. 5m = every 5 minutes. Processes mail every five minutes Answer: D Explanation: -q[time] process saved messages in the queue at given intervals. As it's name implies smbmount is used to mount filesystems being shared using SMB.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 # cd ~hacker # ls he executes ls command of hacker's. C. Processes mail in blocks of five messages B. Quits and restarts sendmail every five minutes C.iso system image C. which of the following is the next step? A. Limits queue to five messages D. and has a syntax similar to the tradition Linux mount command: smbmount //server/service /mountpoint Question: 17 Once a Linux Installation Disk image has been downloaded. where package_name is the name of the package you downloaded: shell> md5sum package_name Question: 18 What is the result of the following command? Sendmail -qp5m A. Question: 16 Which of the following commands can be used to mount a Samba share? A. password=mywindowspassword mount -t samba /servername/sharename /mountdirectory -o username=mywindowsusername. Samba also provides smbmount.iso D. password=mywindowspassword Answer: A Explanation: To solve this problem. Check the file size to ensure the file is uncorrupted Answer: C Explanation: Each package has an individual checksum that you can verify with the following command.

255.conf Answer: B Explanation: The lpd system is configured via /etc/printcap.100.0 netmask 255.0 reject D.168. Linux native D.255.255.168.255. Linux extended Answer: D Page 6 of 217 . Which file should be edited to make this change? A.168.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A Linux technician would like to change the default lpr queue to print to a new printer.255. which kind of partition will be created? A. route del -net 192. Hard drive B. /etc/vprint B. Processor C.conf D. Before configuring /etc/printcap it is a good idea to make a printer test.168.0 netmask 255.255. route add -net 192. /etc/printers/default.100.0 deny C. Video card D.0 netmask 255.100.168. Reiserfs C.0 netmask 255. Swap B.100. route del -net 192.255. Which of the following is the MOST important hardware investment for this user? A.0 deny B.0/24 network using the route command? A.0 reject Answer: D Explanation: route [-v] [-A family] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] [reject] [mod] [dyn] [reinstate] [[dev] If] reject install a blocking route. They have a limited budget. to check if the physical connection between your computer and the printer is working Question: 20 Which of the following commands can be used to configure a router to reject the address for the 192. This is NOT for firewalling.255. which will force a route lookup to fail. /etc/printcap C.100. This is for example used to mask out networks before using the default route. /etc/lpd. route add -net 192. Question: 21 A company wants to install a Linux server to act as an internal file and print server. IEEE-1394 card Answer: A Question: 22 When using fdisk and a partition type of 85 is selected.

Which of the following commands will retrieve the full documentation for the ls command? A. Man -info ls Answer: A Explanation: Texinfo is a documentation system that uses a single source file to produce both online information and printed output. Tail 15 filename B. Which of the following applications would allow the user to configure the WEP (Wired Equivalent Privacy) key? A. M Answer: C Question: 26 Which of the following commands will display the last 15 lines of an application log? A. Info ls B. WINE B. Text ls D.11b. running this command from your shell: info texinfo Question: 24 A user needs to attach a Linux laptop to a wireless access point using 802. Infoman ls C. Cat filename | more 15 Page 7 of 217 . wlancfg C. R D. I C. Cat filename | less 15 C. L B. wl-keygen D. please see the Texinfo manual (written in Texinfo itself). It is primarily designed for writing software manuals. Most likely. For a full description of the Texinfo language and associated tools.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: 82 Linux Swap 83 Linux native 85 Linux extended Question: 23 The man page for the 'ls' command states: The full documentation for ls is maintained as a Texinfo manual. Grep -l 15 | cat D. which of the following interactive commands in 'top' will display the process with highest memory usage? A. netconfig Answer: B Question: 25 When the application 'top' is used.

. The exact output is effected by the other arguments given. If no chain is selected.. IP addresses and port numbers will be printed in numeric format. Cat /var/log/btmp Answer: A Explanation: Lastb is the same as last.. iptables natadd D. Cat /var/log/wtmp D. instead of the last 10 Question: 27 Which of the following commands will allow a system administrator to determine which user have attempted to logon but failed? A. Question: 29 Which of the following commands allows an administrator to add an existing user's phone number to the system as a comment? A. Question: 28 Which of the following commands is used to check the current iptables configuration? A. -L. which contains all the bad login attempts. iptables -LFZ B. Lastb B. iptables -n -L C. or services (whenever applicable). --list List all rules in the selected chain. the program will try to display them as host names. network names. iptables -A -D -C Answer: B Explanation: -n. The output of ls -l b is: Page 8 of 217 . all chains are listed. Usermod -c 555-1234 bsmith B. Useradd -u bsmith -c 555-1234 D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Explanation: tail [OPTION]. By default. Groupadd -u bsmith -c 555-1234 Answer: A Explanation: usermod [-c comment] [-d home_dir [-m]] Question: 30 Suppose b is a link to another file. except that by default it shows a log of the file /var/log/btmp. -n. Last C. Modinfo -u bsmith 555-1234 C. It is legal to specify the -Z (zero) option as well. [FILE]. in which case the chain(s) will be atomically listed and zeroed. --numeric Numeric output.. --lines=N output the last N lines.

dmesg | grep CPU B. Permissions listed for oth the symbolic link and the target file are changed. B. for each symbolic link listed on the command line. The user will receive an error message. ssh -crypto=3des 10. chmod changes the permissions of the pointed-to file.1 Answer: B Explanation: -c blowfish|3des|des Selects the cipher to use for encrypting the session. This is not a problem since the permissions of symbolic links are never used.10. Permissions for the target file are set to 600 while permissions listed for the link are unchanged. The program helps users to print out their bootup messages. However.10. cat /var/log/messages | grep CPU Answer: A Explanation: dmesg is used to examine or control the kernel ring buffer.1? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 lrwxrwxrwx 1 root root 1 Jun 13 12:44 b -> a Which of the following is the effect if root issues the command 'chmod 600 b' A. ssh -c 3des 10. chmod ignores symbolic links encountered during recursive directory traversals Question: 31 Which of the following commands can be used to gather information about the CPU found during boot? A. Permissions associated with the symbolic link itself are set to 600 while permissions for the target file are unchanged. lprd B. In contrast.1 C. ssh -a 3des 10. C. cupsd Page 9 of 217 . cat /proc/cpuinfo | grep CPU C.10.10. D. Question: 33 Which of the following daemons could be used for printing on a Linux system? A.1 B.10.10. ssh -alg=3des 10. sane C. Answer: C Explanation: chmodnever changes the permissions of symbolic links.10.1 D. find /var/log/dmesg | grep CPU D.10.10. Question: 32 Which of the following is the correct way to specify the algorithm for an SSH (Secure Shell) connection to 10.10.

D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D.1. quota -e user C. john. Which of the following commands on the client allows Internet access on the Linux workstations? A.1.1.1 B. route add default gw 10. usbmain B. B.1.1 D. route change gateway 10.quota Answer: A Page 10 of 217 . The router has an IP address of 10.user D. ifconfig eth0 gateway 10.1. reports that he has access to the file '/var/mail/joe'. Answer: C Question: 37 A Linux system administrator needs to edit the quotas for a user.1 C.1.1 Answer: A Explanation: route[-v] [-A family] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] Question: 35 Which of the following modules is the first to load to provide any USB functionality? A. vi /~user/. usb-storage Answer: B Question: 36 A newly created user. User joe's email is still cached by the system although his UID (User ID) has been removed.1.1 on the LAN-side interface.1. User john and joe are sharing a home directory. Which of the following commands can be used to do this? A.1.common unix printing system daemon Question: 34 A new router is installed to share the Internet connection for all users on the LAN (Local Area Network). usb-ohci D. postfix Answer: C Explanation: cupsd . C. but should not have this access. ifconfig eth0 dstaddr 10. User john was created with the same UID (User ID) as the removed user named joe.1. vi /quota. usbcore C. User john is forwarding all of his mail to joe. Edquota user B. Which of the following MOST likely caused this? A.

day of the week (0-6 with 0=Sunday). Question: 40 Which of the following files can be edited to enable the Telnet service? A. Useradd B. cups --queue -h printhost Page 11 of 217 .daily B. Edit /etc/periodic/cron. /etc/xinetd. Answer: D Explanation: crontab [file] A crontab file consists of lines of six fields each. Groupuse C.conf C. and use crontab to install the file. using the cron service? A.d/telnet In this file. /etc/init. Groupset D.. /bin/init B. The fields are separated by spaces or tabs. but by default. To enable the telnet these service. The first five are integers that specify the following: minute (0-59). find the line for disableand change it from the value "yes" to "no". these services are not enabled.d/telnet D.d/telnet Answer: D Explanation: Linux is configured to run the Telnet and FTP server. /sbin/init C. month of the year (1-12). Question: 38 Which of the following commands will add a user to a group from a Telnet session? A. Use a text editor to create a file in /var/cron that specifies the schedule. Question: 41 Which of the following commands could be used to show the waiting print jobs on printhost using the CUPS printing system? A. day of the month (131). lpstat -h printhost B. D. User2group Answer: A Question: 39 How could a user arrange for a command to be run daily at a certain time on a Linux system.. Create a file to specify the schedule. showqueue -h printhost C. login to the server as the root userid and edit the files: /etc/xinetd. Specify the schedule using entries in a file at /etc/cron.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: edquota [ -p protoname ] [ -ug ] [ -r ] [ -F format-name ] username. hour (0-23).

chmod 4777 /tmp Answer: B Page 12 of 217 . C. lpr --list-jobs -h printhost Answer: A Explanation: lpstat [ -E ] [ -h server ] [ -l ] [ -W which-jobs ] [ -a [ destination(s) ] ] [ -c [ class(es) ] [ -d ] [ -o [ destination(s) ] ] [ -p [ printer(s) ] ] [ -r ] [ -R ] [ -s ] [ -t ] [ -u [ user(s) ] ] [ -v [ printer(s) ] ] -h server Specifies the CUPS server to communicate with. The cron process should have a lower PID (Process ID). Answer: B Explanation: /usr/. The getty program should not run with 38400 baud. Question: 42 The administrator suspects the system has been compromised and runs the ps command: 615 ? Ss 0:00 /usr/sbin/sshd 624 ? Ss 0:00 /usr/bin/X11/xfs -daemon 707 ? Ss 0:00 /usr/sbin/cron 709 ? Ss 0:00 /usr/. One of the hard drivs has crashed Answer: C Question: 44 The administrator needs to set permissions on the /tmp directory as follows: drwxrwxrwt 9 root root 4096 Jun 13 09:42 tmp Which of the following commands will accomplish this? A. The xfs process should not be run in daemon modes. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. chmod 2777 /tmp D. The httpd program is not normally in /usr/. Question: 43 A system is very likely compromised if which of the following has occurred? A.sbin. C. chmod 1777 /tmp C. Some commands behave abnormally D. The system is extremely slow B. D.sbin/httpd 775 ? Ss 0:00 /usr/sbin/X11/xdm 776 tty1 Ss+ 0:00 /sbin/getty 38400 tty1 Which of the following should be investigated? A. The /root file system is full. chmod 0777 /tmp B.sbin is a hidden catalog.

cat /proc/disks Answer: A Explanation: -l List the partition tables for the specified devices and then exit.Turn on sticky bit. Differential SCSI B. reiserfs Answer: C Question: 48 Which of the following commands could be used to display all recognized drives and all existing partitions? A. + B. / Answer: C Question: 47 On a dual-boot system. Question: 45 Six Linux servers share a tape library in a different room located 80 meters away. ufs C. If no devices are given. ! D. IEEE-1394 Answer: C Explanation: 30 meters device to device (copper). Single-Ended SCSI C. Question: 49 Page 13 of 217 . Which of the following technologies would allow these server to connect directly to the tape library? A. C. xfs B. vfat D. Fibre Channel D. 10 kilometers device to device (optical) Question: 46 Which of the following symbols is added to the beginning of the password field in the /etc/passwd file so that the user cannot log in? A. ls /dev/disks/* D. fdisk -l B. showdrives C. those mentioned in /proc/partitions (if that exists) are used.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: 1000 . which of the following file systems would be accessible from both Windows and Linux operating system? A.

Use a bootable Linux medium to boot into Linux and run fsck.root file C.conf C. Page 14 of 217 . Update the in-addr. /etc/acpi.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 If a system uses ACPI (Advanced Control and Power Interface). /etc/acpi/powerbutton Answer: C Question: 50 The DNS administrator learns that the IP address of one of the Internet root name servers has been changed. 12 Answer: A Question: 52 When executed. Use a bootable Linux medium to boot into Linux and run fdisk. Reinstall Linux from the original install drive and apply all patches. Update the root. but hard drive diagnostics indicate that the drive is working properly. lha tarball Answer: C Question: 53 A Linux system will not boot. /etc/acpi/events/power D. /etc/modules. D. Which of the following should be done to repair the file system? A. what type of installation file is created by the following command? tar cvvjf filename file4 file2 file12 A. jar archieve B. gzip archieve C.arpa file. Update the named.conf file D.conf B. Answer: A Question: 51 To which of the following IRQ settings does ttyS1 default on a Linux server? A.hints file. 5 C. Use the custom tool provided by the hard drive manufacturer. B. B. 4 D. Update the resolve. bzip2 tarball D. C. even in single-user mode. 3 B. Which is the next course of action? A. which of the following files would be edited to map the power button to the desired command? A. Answer: B Explanation: fsck is used to check and optionally repair a one or more Linux file systems.

Question: 57 The primary usages of the Snort application include which of the following? A. B. vulnerability assessment. Snort has a real-time alerting Page 15 of 217 . Intrusion detection. Intrusion detection. and malware detection C. ssh -6 -l user 192.conf file and run "fdisk /mbr" D.100 B. Snort uses a flexible rules language to describe traffic that it should collect or pass. packet sniffing. SMB probes. sshd -l user 192. bash -limited Answer: B Question: 56 Which of the following commands should be used to allow SSH (Secure Shell) to connect to a server with IP address 192.0. and packet logging Answer: D Explanation: Snort is a lightweight network intrusion detection system. sshd -6192. ssh -l user 192. virus detection. verify the lilo. bash -r C.0. and network mapping.100 D.0.100 Answer: B Explanation: ssh .168. and network scanning D.0.168. OS fingerprinting attempts. exec bash D. Boot using a rescue disk.168. and much more.168. Boot using the Linux distribution installation CD and run fsck on the /boot partition.100 C. verify the lilo.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 54 The MBR (master boot record) created from lilo on a system is corrupt.conf. B. verify the lilo. Answer: D Question: 55 The company hires a temporary employee and wants to provide limited access to its production server. Boot using a live CD distribution and run chroot. It can perform protocol analysis. How can this be fixed? A. Boot using a rescue disk. stealth port scans. CGI attacks.conf file and run "fixboot --mbr -t lilo". capable of performing real-time traffic analysis and packet logging on IP networks.100? A. password cracking.0.OpenSSH SSH client (remote login program) -l login_name Specifies the user to log in as on the remote machine -6 Forces ssh to use IPv6 addresses only. and run lilo. Intrusion detection. Intrusion detection. rbash B. content searching/matching and can be used to detect a variety of attacks and probes. Which of the following would accomplish the goal? A.168. C. as well as a detection engine that utilizes a modular plugin architecture. such as buffer overflows.

B. or WinPopup messages to Windows clients using Samba's smbclient.168.120 B.120 Answer: A Question: 60 How can the Apache working directory be set to /home/user/html from the commans line? A. Which of the following actions will accomplish this? A. a UNIX socket. D. httpd -r /home/user/html C. Which of the following commands searches the "/var/log/wtmp" file and displays who has logged onto the machine and when they logged on? A. Sets eth0 to 192. last D. Set the SGID bit using 'chmod g+s /home/ourgroup'. Set permanent permissions on the directory by running 'mkdir g+s /home/ourgroup'. who C. Sets eth0 to listen for all addresses. C. the eth0 will be set to 192.0 up Which of the following will this command accomplish? A. Answer: A Question: 59 The following command is about to be executed: Ifconfig eth0192. Adds an alias for 192. Snort has three primary uses. incorporating alerting mechanisms for syslog.168.120 on eth0.168. or as a full blown network intrusion detection system. httpd --directory /home/user/html Answer: A Explanation: httpd [ -X ] [ -R libexecdir ] [ -d serverroot ] [ -f config ] [ -C directive ] [ -c directive ] [ -D parameter ] Question: 61 A system administrator routinely needs to see the list of who has logged in and logged out on a machine as well as their login times. a user specified file. Assign private permissions on the directory using 'chown g+s /home/ourgroup'. httpd -d /home/user/html B. a packet logger (useful for network traffic debugging. It can be used as a straight packet sniffer like tcpdump. C.120 netmask 255. Set the sticky bit using 'chmod 2770 /home/ourgroup'. etc). D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 capability as well.168.0. Question: 58 Files created in the /home/ourgroup directory need to automatically have group ownership that is identical to the directory itself.0. w B.255. httpd --root /home/user/html D. log --list Page 16 of 217 .255.0. At the next reboot.0.

The /etc/passwd file is unchanged. C. hosts.. guest ok = yes B. and terminals. security = share D. B. mkisofs -o /dev/cd /temp/tocd C.0. Question: 62 A user wants to copy files in the directory /tmp/tocd to the first recordable CD-ROM (CDRW) device. /etc/passwd is renamed to /etc/shadow and a new soft link is created. cdrecord -R /tmp/tocd B. Which of the following commands could do this? A. Page 17 of 217 . Entries in the /etc/passwd file are added to a new /etc/shadow file. browseable = yes Answer: A Explanation: The guest ok parameter means access will be permitted as the default guest user Question: 64 If the /etc/shadow file does not exist when pwconv is run.trackn Question: 63 Review the following Samba configuration file entry: [global] workgroup = NT-FAKERS netbios name = DUDE security = share browseable = yes [public] guest ok = yes writeable = yes security = share browseable = yes path = /export/public Which of the following lines allows the user to access the public share on this server without authentication? A. The system will give an error message. dd if=/tmp/tocd of=/dev/write D..Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Explanation: Shows login information about users. writeable = yes C. which of the following occur? A.0Answer: D Explanation: cdrecord [ general options ] dev=device [ track options ] track1. mkisofs /tmp/tocd | cdrecord dev=0.

Password attributes (for example.password=windowspassword Answer: B Question: 66 Which of the following are the default permission of /tmp? A.password=windowspassword 0 0 D. If the /etc/shadow file does not exist. this command will create /etc/shadow with information from /etc/passwd. XF86Config C. Answer: D Explanation: The pwconv command creates and updates /etc/shadow with information from /etc/passwd. The Linux kernel sources for the installed kernel Answer: D Question: 68 Which of the following files holds the XFree86 configuration by default? A.conf B. XFree86. servername:sharename /mountdirectory smbfs username=windowsusername. The distributor's source code B. smbmount //servername/sharename /mountdirectory -o username=windowsusername. //servername/sharename /mountdirectory smbfs username=windowsusername.password=windowspassword 0 0 C. Which of the following is needed to make these drivers work? A. The manufacturer's development library D. //servername/sharename /mountdirectory sambafs username=windowsusername. 1755 C. password and aging information) that exist in an /etc/passwd entry will be moved to the corresponding entry in /etc/shadow. Password attributes in /etc/passwd are moved to a corresponding entry in a new /etc/shadow file. Question: 65 Which of the following fstab entries will mount a Samba share at boot time? A.password=windowspassword 0 0 B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. 1777 B. but no binary drivers are provided. 0222 Answer: A Question: 67 The network card in the server is on the Linux distributor's HCL (Hardware Compatibility List). The drivers may be downloaded in source code form only. 0755 D.conf D. XFree86Config Page 18 of 217 . XF86. The manufacturer's installation kit C.

LDAP (Lightweight Directory Access Protocol) Answer: C Question: 71 Which of the following commands can be used to verify that an NIS client is reading authentication information from the NIS server? A. MySQL D. Which of the following server packages would MOST likely be installed? A. /etc/timezone B. /etc/localtime C. How can it be verified that the package has not been altered? A. ypcat passwd Answer: D Question: 72 Which of the following files sets the default time zone used by the date command? A. Download the MD5 hash file from the original FTP site and compare it against the MD5 hash generated from the downloaded file. yppasswd C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 69 A system administrator has recently downloaded a network analysis toll from a FTP repository. /etc/defaults/date Answer: B Question: 73 The pwconv command does the following? Page 19 of 217 . suspicious behavior is noted. C. After installation of the tool. Boot the system from a live CD distribution and run the fsck tool on the partition where the package is installed. KDE B. Answer: D Question: 70 A mid-sized technology firm wants a dedicated machine to analyze data from previous client projects. Download the MD5 hash file from the original software developer's website and compare it against the MD5 hash generated from the downloaded file. D. B. nispasswd D. PHP C. ypwhich B. /etc/default_time D. Uninstall the application and re-install it while in single user mode and carefully watch the install logs for suspicious activity.

.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. grep -r root . SMB C. grep -u root .conf Answer: C Question: 77 Which of the following commands will recursively search through all subdirectories from the current directory for files owned by the root user? A. It creates the /usr/lib/shadow file. access.-uid 0 B.htaccess B. and places an x in the password field of the /etc/passwd file. moves the encrypted passwords into it. srm. find . and places an x in the password field of the /etc/passwd file. Help C. Answer: C Question: 74 When a user begins to use a shell. find . FTP D. Manual Answer: B Question: 75 Which of the following services commonly uses Port 139? A. DNS B. D. httpd. the only information showing is the prompt.-uname root Answer: A Question: 78 Page 20 of 217 . POP3 Answer: B Question: 76 Which Apache configuration file controls the mapping of SSL certificates? A. C. Man B. C.conf C. D. It creates the /etc/shadow file. B. It removes the /usr/lib/shadow file and places the encrypted passwords in the second field of the /etc/passwd file. Which of the following can be used to determine which commands are available? A. moves the encrypted passwords into it. It removes the /etc/shadow file and places the encrypted passwords in the second field of the /etc/passwd file. Locate D.conf D.

:1. you can override vi's default of operating only on the current line by preceding them with a range of line numbers. Modular C. Once the correct codec is received. In the program's source directory. Answer: C Question: 80 How can a Linux user use vi to edit the first 30 lines of a 60-line file and replace all occurrences of 'test' to 'TEST'? A. PATH=PATH$:/usr/local/program1/bin Answer: C Question: 79 An error was returned stating that the proper MPEG-2 codec could not be found. Create a script on the administrator's workstation to attach to each server and copy its log files to the local drive. setenv PATH=$PATH: /usr/local/program1/bin C. setpath PATH=$PATH:/usr/local/program1/bin B.30s/test/TEST/g Answer: D Explanation: Any command that begins with a ":" is called a line mode command and performs its duty on the line the cursor is currently on.html Question: 81 ` backup? A.t-a-y-l-o-r. For example. However. Incremental Answer: D Question: 82 A system administrator of a 200-server network wants to simplify routine monitoring of log files on each server. In the application's specific codec directory D. Page 21 of 217 . Which of the following is considered the BEST practice method to do this? A. if we wanted to replace guy with gal on lines 32 through 56 we would type :32. then compiled into it. In the user's home directory B.com/VBsr. As an accessible device in /dev C. Partial D. export PATH=$PATH: /usr/local/program1/bin D. :s/test/TEST/g B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 What command should be run in order to add /usr/local/program1/bin to the path and make it active in the current shell? A. Full B.56s/guy/gal/gTaken from http://unix. :/s/test/TEST/g C. :30s/test/TEST/g D. where should it be placed? A.

Question: 83 Which of the following is contained in the init.Multiuser. D. Service startup scripts D. C. Reboot to runlevel 6. The runlevels used by RHS are: 0 . Access control lists C. 3 C. Create a new server called 'loghost'. New user templates B. D. Infrared remote control configuration files Answer: C Question: 84 After a power outage. Create a script on each server to analyze each of the log files on the server and forward important information to the administrator's workstation. Run logcp at each server. Which of the following should be done first? A.Single user mode 2 . Run fsck on each file system and try to mount again.halt (Do NOT set initdefault to this) 1 . without NFS (The same as 3. Answer: B Explanation: The answer is to have a special server set up to centrally receive all log files from the different boxes in the network.Full multiuser mode 4 . C.X11 6 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. 5 D. Reinstall the operating system. Specify the administrator's workstation as the destination and "*" for which log files to forward. Modify the syslog.conf file on each server so log files are forwarded to 'loghost'. a Linux machine reboots but fails to mount all of its file systems. Answer: D Explanation: fsck is used to check and optionally repair a one or more Linux file systems. The file systems are unable to be mounted manually. if you do not have networking) 3 . 6 Answer: B Explanation: Default runlevel.unused 5 .d directory? A. 0 B. B.reboot (Do NOT set initdefault to this) Page 22 of 217 . Edit /etc/fstab and correct any problems identified. Question: 85 Which of the following runlevels is generally used to ensure the Linux server will boot into full multi-user mode without starting X Windows? A.

allow C.conf file is used to configure which services are to be used to determine information such as hostnames. C.conf Answer: D Explanation: The /etc/nsswitch. NTP (Network Tim Protocol) D. whereis -time 2 D. grep / -ctime 2 Page 23 of 217 . Which of the following daemons should the administrator verify is running? A. lpd. Use a firewall to close the port used by "hosts".equiv D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 86 How can an administrator prevent /etc/hosts from overriding DNS resolution? A. Use a higher serial number in the DNS zone file. kerneld B. Time B. dhcpd Answer: D Question: 89 An administrator need to synchronize a workstation's system time with a network server. password files. printcap B. B. Move the NIS entry beneath the DNS entries in /etc/resolv. NNTP (Network News Transport Protocol) Answer: C Question: 90 Which of the following commands will locate files that have been modified in the past two days? A. hosts. find / -mtime 2 C. Change the order in which DNS and hosts are used by editing /etc/nsswitch. Routed D. Which of the following services will allow the workstation to automatically set the time? A. hosts.conf D. utime C. Named C. locate -t2 B.allow Answer: C Question: 88 Users being reporting 'Unable to obtain IP address' error messages. and group files. Question: 87 LPR access for specific hosts can be configured in which of the following files? A.

192 Answer: D Question: 93 Which of the following command lines can be used to show a map of the current process hierarchy. 255.255 C.1 root root 4096 Apr 20 17:30 filename To -rwx-w---. Whenever the uid of a process differs from the uid of its parent. pstree -u B. psgraph -u C. ps --map -u D. Which of the following is the correct representation of the subnet mask? A.168.4/26. 192.] [expression] -mtime n File's data was last modified n*24 hours ago.5.g-w.255.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Explanation: find [path.255..1 root root 4096 Apr 20 17:40 filename Which of the following commands will accomplish this? A. chmod u+x.168. top --map -u Answer: A Explanation: pstree shows running processes as a tree.0 D.0 B.5. Question: 94 Shadow passwords are disabled on a Linux server. chown 720 filename Answer: B Question: 92 The administrator must change the IP address of the server to 192.o-r filename C.. the new uid is shown in parentheses after the process name. -u Show uid transitions.255. 255. Which of the following appears after a user's name in the /etc/passwd file when a user account is disabled? Page 24 of 217 . chmod u+x. chmod 710 filename D.168. including information about userid transition points? A.255.g+w-r. 192.5.o-r filename B. Question: 91 A superuser wants to transform the following permission set from -rw-r--r-.

cat "alias scsi_hostcontroller acme. The driver is also available in the modules directory on the server's hard drive.o) is manually loaded and works.o B.rpm.4.20.o -v /boot/initrd-2. Which of the following commands will uncompress the file for use? A. Only root and file owner C. name1 | name2 < name3 Page 25 of 217 . Only root and group owner D. file owner. name1 < name2 | name3 C.o /boot/initrd-2. bunzip2 package.gz 2. D. Which of the following shell commands will do this? A.rpm.4.4.20. The system.conf Answer: C Question: 97 A user receives a file named package.bz2 C. which runs LILO and uses kernel 2. mkinitrd -f --with=acme. C. After booting from the recovery CD-ROM.4.20. will no longer boot. modprobe -p acme.gz 2. bzip -d package.20 C. name1 | name2 > name3 B. B.rpm.bz2. bunzip package.bz2 D. Only root. name1 > name2 | name3 D.bz2 Answer: B Question: 98 A user wants the script 'name1' to process the contents of the file 'name2'.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A.20 D.rpm. and group owner Answer: B Question: 96 An Acme SCSI controller was installed on the server to support the boot drive.bz2 B. X ? & * Answer: D Question: 95 When a user runs s l the following output is displayed: drwxrwxrwt 3 john1 users2 4096 Aug 06 13:42 research Who has permission to delete files in this directory? A. lilo append=acme. Which of the following commands will fix the problem? A. bzip2 --uncompress package. the Acme driver (acme.o">>/etc/modules.rpm.4. then redirect the output to the program 'name3'. All users B.

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 99 Which of the following file systems CANNOT be mounted by using the mount command? A. This is not a 'mounted' file system. but not to delete print jobs. The kill command is used to end a process. Page 26 of 217 . You can mount an ext2 file system using the 'mount -t ext2' command. Sybex Linux + Study Guide: page 557. Use the lprm command to remove the report D. A user can delete any print jobs that belong to the user. and can be extended using the 'swapon' command. Smith. You can mount an iso9660 file system using the 'mount -t iso9660' command (iso9660 is used for CD-ROM drives). Smith. The command is issued with the job ID to delete a print job. D. Reference: Roderick W. Answer: C. Which of the following should be done? A. The swap partition is configured during setup. Prints a file. Use the lpq command to remove the job B. Explanation: The lprm command can be used to remove one or more print jobs from the print queue. vfat C. The print queue and job Ids can be viewed with the lpq command. Ask the superuser to remove the report from the queue because users cannot do this. Question: 100 A Linux user has sent a report to the printer queue. Reference: Roderick W. You can mount an VFAT file system using the 'mount -t vfat' command. but then realizes he needs to make corrections to the report. Question: 101 What does the lpq command do? A. D. iso9660 Answer: C Explanation: The Swap file system is used as virtual memory. Incorrect Answers: A. Use the kill command to remove the report C. It cannot be used to delete individual print jobs. ext2 B. Sybex Linux + Study Guide: page 39. swap D. 465. The lpq command is used to view the print queue. B. B. He now wants to remove the report from the printer queue. Incorrect Answers: A.

The information displayed includes the print job IDs and owners. Reference: Roderick W. Use the newgrp command.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. Inside Linux: Page 466. The lprm command is used to remove a print job. C. C. D. Edit the /etc/inittab file to load without NIS. Answer: D. C. Sybex Linux + Study Guide: page 556. Explanation: If you forget the root password. B. New Riders. There is no 'Administrator' group in Linux. Answer: D. Question: 103 The system administrator needs to create two new groups. B. C. you can boot init into the shell and change the password using the following commands: boot: Linux init=/bin/sh bash# mount -o remount / -rw bash# passwd root Reference: Michael J. B. Sets up a printer on the system. The /etc/printcap file can be used to set up a printer. Use the brute-force password sniffer. D. D.conf file. not the lpq command. Which of the following should be done to accomplish this? A. Incorrect Answers: A. You would still need to be logged in to change the password. you would still need the local root password. Use the groupadd command. A sniffer can only be used to capture a password traveling over the network. Page 27 of 217 . The lpr command is used to print. not the lpq command. Use the passwd command from the administrator group. Reboot the system in runlevel 1 and use "init=/bin/sh" as a boot option. The equivalent is the 'Root' group. Answer: B. Question: 102 A system administrator who has forgotten his root password on a server can do which of the following to change the root password? A. Incorrect Answers: A. not the lpq command. C. Enter the group data in the /etc/group. B. Shows status of the print queue. If you bypassed NIS. Smith. Use the creategroup command. Removes a print job. 'develop' and 'admin'. Explanation: The lpq command is used to display the status of the print queue. Tobler.

chown -R user2 /tmp/data/user1 D. Sybex Linux + Study Guide: page 368. It should only be entered once. Sybex. Creategroup is a non-existent command. B. The new owner should be entered before the directory/file name. Linux for Windows NT/2000 Administrators: page 212. Reference: Mark Minasi. Smith. chown user2 /tmp/data/user1 user2 Answer: C. It is mandatory that encrypted passwords be used. The syntax is incorrect. D. It cannot be used to create a group. ssh B. Sybex Linux + Study Guide: page 270. D. Page 28 of 217 . Which of the following network utilities should be used? A. Incorrect answers: A. Smith. Explanation: SSH (Secure Shell) provides a secure connection between an SSH server and an SSH host.conf file. There is no group.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: The groupadd command is used to create new groups. The new owner is entered twice. Question: 104 How would an administrator change the ownership of the directory /tmp/data/user1 from the account 'user1' to the account 'user2'? A. chown /tmp/data/user2 user 1 B. Reference: Roderick W. Incorrect Answers: A. C. tftp D. All data and passwords are encrypted over the connection. rsh C. Reference: Roderick W. Explanation: The syntax of the chown command is 'chown <new owner> <directory/file>'. The -R option makes the command recursive meaning that the ownership will be changed on the entire contents of the directory. The newgrp command is used to change a user accounts group membership. telnet Answer: A. chown -R /tmp/data/user1 user2 C. Question: 105 A user needs to securely connect to a server.

It is not used to securely connect to a server. There is no hwinfo.conf file D. Sybex Linux + Study Guide: page 476.newaliases B . /etc/start D. It allows a user on one system to run programs on another system without authentication. the default settings are copied from which of the following? A. There is no hwinfo. The /etc/hwinfo. This information will be created in Linux in which of the following? A.killall -HUP sendmail D . C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect answers: B. D. Reference: Roderick W. The /usr directory contains Linux documentation and program files. It's a virtual file system created by Linux to provide information about hardware devices./etc/init. RSH should be disabled on servers. Telnet sends passwords in plain text. Smith. the command 'cat /proc/cpuinfo' will display information about the CPU. For example. C.d/aliasd restart Answer: A Question: 107 A system is going to have its memory and CPU upgraded. Question: 108 When a new user account is created. The /usr/src/linux/devices directory Answer: A. TFTP (Trivial File Transfer Protocol) is used to transfer files over a network. It doesn't contain any machine specific data. Question: 106 Which of the following commands should be run after editing the /etc/aliases file in order for sendmail to recognize any changes to that file? A .conf file C. Explanation: Page 29 of 217 . Incorrect Answers: B. /usr/skel B.conf file.conf file. The /dev/hwinfo. The /proc directory B. /etc/default Answer: B. /etc/skel C.makemap newaliases C . D. RSH (Remote Shell) is very insecure. Explanation: The /proc directory isn't actually a directory.

comp B.uk/ccfaq/common. C.co. Question: 110 What command. The -rf option. then Linux assumes that you want to change to the root user account. Reference: Roderick W. The -c option tells Linux to run a command in the context of the root account.htm Incorrect Answers: A. D. it won't ask you to confirm the file deletion). although 'compare' can be used as an option for the 'tar' utility.oreillynet. will remove all files from the /tmp directory by prompting the user for the root password? A.com/linux/cmd/s/su. Question: 109 Which if the following commands can be used to compare two text files to find out how they are different? A. cirtmp B. Smith.demon. If no username is specified with the su command. the default configuration files are copied from the /etc/skel directory. The rm command is used to remove the files.html Page 30 of 217 . when issued from a non-root user. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When a new user account is created. Reference: http://www. diff C. su "rm 'rf /tmp*" D. This is the incorrect path to the default user account configuration files. There is no comp command. filediff Answer: B. compare D. su -c "rm -rf /tmp*" Answer: D Explanation: The su command is used to switch to another user account. Reference: http://www.numenor. There is no filediff command. This is the incorrect path to the default user account configuration files.e. Sybex Linux + Study Guide: page 260. Explanation: The diff command is used to display line by line differences between pairs of text files. D. There is no compare command. Incorrect Answers: A. make the command recursive and forceful (i. This is the incorrect path to the default user account configuration files. rm -rf /tmp/* -su C.

The rm command is used to remove a file or directory. "25G" puts you on line 25. ls C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. tar -cvf /home/httpd /dev/st0 C. Reference: Roderick W.5 Incorrect Answers: A. Sybex Linux + Study Guide: page 523. C.tar /home/httpd/ B. D.tar Page 31 of 217 . C. :25 B. Question: 111 Which of the following commands can be used to go to the 25th line of a file in vi? A. Question: 112 Which of the following commands can be used to create new directories? A. G25 D. g25 Answer: B. The "G" must follow the line number. B. Smith.net/cgi-bin/vim2html2. The ls command is used to list the contents of a directory. The "G" is case sensitive and follows the line number. Which if the following commands would best accomplish this? A. tar -cvf /home/httpd/ webbackup. Incorrect Answers: A. this command positions you at the given line number. Explanation: The mkdir command is used to create new directories. You must use the "G" command to go to a specific line. Explanation: The way to go to a specific line in Vi is to use the "G" command. With a count. B.sourceforge.txt#03. C. rm B. mkdir Answer: D. 25G C. There is no cirtmp command. Question: 113 A customer wants to backup her entire Website into a file. tar -cvf www. You must use su to switch user before the remove command. Reference: http://vimdoc. For example. You must use the -c option with su if you want it to run a command after switching user. mv D.pl?page=usr_03. The mv command is used to move or rename a file or directory.

Sybex Linux + Study Guide: page 258. tar -cvf /dev/st0/web. umask C. The source files and destination file are in the wrong order. Reference: Roderick W. mask B. D. To indicate that Smith is a superuser. D. Page 32 of 217 . Question: 114 Which of the following commands is used to set default file permissions for any newly created file? A.tar. Createmask is a non-existent command. This command is trying to backup the files to a tape drive. B. You must specify a filename when using the tar command. Question: 115 The following is an extract in a password file: Smith: * : 1133 : 334 : John Smith: /usr/people/jsmith: /bin/tcsh What is the purpose of the "*" IN Smith's password field? A. Incorrect Answers: A. However. the contents of the /home/httpd directory (the default location for a website) are backed up to a file named www. To force Smith to change his password at his next login. D. Answer: A. C. fmask D. these default settings are known as the user mask can be changed with the umask command.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Smith. To deactivate Smith's account. Incorrect Answers: B. The -cvf options mean compressed. createMask Answer: B. C. Sybex Linux + Study Guide: page 194/5. Reference: Roderick W. you must use the '--file' option. To indicate that Smith's home directory is shared by other members of his group.tar /home/httpd/ Answer: A. However. verbose and forceful. Explanation: The syntax of the tar command is 'tar <options> <filename> <files to add>'. Explanation: When a file is created. In this question. when using 'tar' to backup to a tape drive. Fmask is a non-existent command. For example. Smith. the creator of the file is the owner of the file and the group is the owners primary group. C. The mask command is used when configuring the IP address of a Linux computer. the file has a default set of permissions.

Question: 116 A Linux system is planned to have both an Ethernet card and a modem.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: When you create a user account with the adduser command. Explanation: XFree86 provides a graphic user interface and is installed by default when a workstation installation is selected. Pump C. netmask and DHCP server address. C. C. you must specify a password with the passwd command. Sybex Linux + Study Guide: page 628. nntpd B. D. To enable the account. The user will not be able to log in when the password field contains a "*" because the account is disabled. New Riders. DNS (Domain Name System) is used to resolve host names to IP addresses. You can disable an account by placing a "*" in the password field of the password file. XFree86 D. A. Smith. Page 33 of 217 . It's output included the IP address. Incorrect Answers: B. the account doesn't have a password. D. On each of these networks the IP addresses are dynamically assigned. Router Answer: B. Which if the following services should be considered for installation? A. dhcpd Answer: C. SNMP D. Explanation: The pump command is used to verify that the computer is receiving DHCP information from the DHCP servers. DNS B. The "*" is in the password field and so is not related to the users' home directory. The "*" is in the password field and so does not indicate that the account is a superuser. Incorrect Answers. Squid C. The password field in the password file contains a "*". Tobler. It would not be useful in this case. A router is used to route traffic between networks. Reference: Michael J. Inside Linux: Page 397. Question: 117 Which if the following services is installed when a "workstation" installation is selected? A. Reference: Roderick W. It would not be useful in this case. SNMP (Simple Network Management Protocol) is used for the monitoring of hardware devices. It would not be useful in this case.

This file can be read by anyone. This is a server service and is not installed in a workstation configuration. It improves the encryption for all passwords in the /etc/passwd file. Answer: C. D. Incorrect Answers: A. In the /root directory. Explanation: LILO (the Linux boot loader) is installed by default in the Master Boot Record (MBR). D. Question: 119 Why is the Shadow Password Suite important? A. Reference: Roderick W. C. This is a server service and is not installed in a workstation configuration. This is a server service and is not installed in a workstation configuration. It provides a second level of encryption for the /etc/passwd file. not the /usr/sbin directory. Question: 118 Linux will be installed on a new system. Squid is a proxy server application. DHCPd is the Dynamic Host Configuration Protocol daemon. the users' passwords are stored in the /etc/passwd file. B. Page 34 of 217 . LILO is installed by default in the Master Boot Record. D. Explanation: If you are not using the Shadow Password Suite. The Shadow Password Suite does not change the password encryption. B. It moves the passwords to a separate file and will also encrypt the password file. Smith. Smith. D. When using the Shadow Password Suite. which can only be read by the root user. LILO is installed by default in the Master Boot Record. The Shadow Password Suite does not encrypt the password file. not the /boot directory. Sybex Linux + Study Guide: page 212. Incorrect Answers A. NNTPd is the Network News Transfer Protocol daemon. Where will LILO be installed? A. Incorrect Answers: A. In the /usr/sbin directory. not the /root directory.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W. C. In the /boot directory. In the master boot record. LILO is installed by default in the Master Boot Record. Answer: C. B. B. B. D. Reference: Roderick W. Sybex Linux + Study Guide: page 22. The Shadow Password Suite does not change the password encryption. the passwords are moved to another file. Sybex Linux + Study Guide: page 117-118. Smith. It moves the passwords to a separate file that has more restrictive permissions.

C. C. not a /etc partition. Reference: Roderick W.d/init./etc/init.shtml Incorrect Answers: A. not a /boot partition.org. /etc D. not a /var partition. When the system restarts. The local system has been reconfigured to connect using DHCP. Change the network routing table. Ifconfig is not the correct command to restart the network services. Page 35 of 217 ./usr/bin/network restart.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 120 Which if the following is the only required partition when Linux is installed? A./sbin/route restart. B. Incorrect Answers: B. Route restart is not the correct command to restart the network services. ping comptia. Linux requires a root (/) partition. Question: 122 The Ethernet card fails on a Linux machine without modular support. Which if the following is necessary to finish the installation? A.d/network restart command. Sybex Linux + Study Guide: page 37. /var C. Linux requires a root (/) partition. D. /boot Answer: A. How could an administrator restart the network services and test that the interface and the DHCP server are functioning properly? A . iftonfig lo B . ifconfig eth0 Answer: D Explanation: After configuring DHCP you need to restart the network services with the etc/rc. Smith. Linux requires just one partition to install and boot. / B. Explanation: At a bare minimum.d/network restart.linuxheadquarters. ping comptia. and is replaced by one from a different manufacturer. Netstat is not the correct command to restart the network services./bin/netstat-R. Question: 121 A DHCP server has been added to the network. This is the root partition. which is known as the / partition. You can verify that that your computer has received the DHCP settings by pinging and internet address such as comptia.org D . Reference: http://www. Linux requires a root (/) partition. The new card is verified as Linux compatible. the operating system does not recognize the new card.com/howto/networking/networkconfig.org C .

Reference: Roderick W. Recompile the kernel with support for the new device. tar cvf linux-2. You need the 'z' option to invoke gzip. Smith. C.tar.4.tar. gzip -q linux-2.tar. The tar command invokes the tar program. The routing table is unrelated to the physical network card or its drivers. You need to use the tar program and invoke gzip with the 'z' option. Question: 124 An administrator has installed a DHCP daemon. top B.tar.3.tar Answer: B.3. You need to use the tar program and invoke gzip with the 'z' option. C.tar D.4. The 'z' option means use gzip to uncompress the files. Sybex Linux + Study Guide: page 194-195. dhcpd -restart C.3. Edit the Ethernet configuration file to point to the new device. Incorrect Answers: A. The first thing to do is to extract the files using the same programs. Smith.gz. You need to recompile the kernel to remove the old network card driver.4. D.3. D.gz extension indicates that the file has been tarred and compressed (zipped) using the tar and gzip programs. ps aux | grep dhcpd D.4.3.4.3. Question: 123 A client has downloaded the latest Linux kernel source and wants to compile and install it on a home machine. Incorrect Answers: A. If you replace the network card with one from a different vendor. The downloaded file is named "linux-2.tar. Explanation: The . Reference: Roderick W. D.4.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B.tar. tar xzvf linux-2. The old driver is integrated into the kernel and needs to be removed.3. Answer: B. The 'x' option means extract. The 'v' option means verbose mode and the 'f' option means to force the operation with any conformation messages. Which if the following should be run to see if the process is running? A. C. rpm -check dhcpd Page 36 of 217 . Download a new driver and add it to the /dev directory. tar xvf linux-2.gz".gz B.gz C. you'll need to recompile the kernel to remove the old network card driver. tar xvf linux-2. gzip -c linux-2.gz. Explanation: A network card without modular support will have its drivers integrated into the kernel. Sybex Linux + Study Guide: page 211.4. What command should be issued first? A.

you need the execute permission.shtml Incorrect Answers: A. HPFS B. The read only permission will not allow you to enter the directory. C.unixgeeks. ReiserFS Answer: B. Execute and read Answer: D. to enter the directory.org/security/newbie/unix/man9/misc3. D. Reference: http://www. FAT32 D. However.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. Read only B. B. The execute permission will not allow you to list the contents of the directory. ext2 C. Which of the following would best provide this ability? A. Explanation: The ps aux command displays all the running processes.com/articles/cards/permissions. Question: 126 While a technician was installing Linux on a customer's server. Grep dhcpd will search for dhcpd in the output from the ps aux command. The dhcpd -restart command will restart the DHCP daemon. Reference: http://www. The rpm command cannot be used to verify that a process is running. It will not verify the process is running. The top command displays the running processes that are using the most CPU time. Write and read D. Explanation: You can list the contents of a directory with the read permission. B. Grep is a search utility. The DHCP daemon doesn't use much CPU time and is therefore unlikely to be displayed using the top command. Explanation: Page 37 of 217 . The write permission will allow to create files in the directory. The pipe (|) passes the output to the grep utility. the customer asked for the ability to expand the partition size. Question: 125 What minimum permission must a directory have for a user to both enter the directory and list its contents? A. Execute only C. This is not the minimum required permission to enter a directory and list its contents.firstlinux.html#ps Incorrect Answers: A. as needed.

Apache and BIND B. C. D. Page 38 of 217 . Linux will run on systems with less than 64 MB or RAM (memory). 59. Verify the hardware on the Linux hardware compatibility list. Squid and ipchains Answer: A. Incorrect Answers: A. Create ext2 and swap partitions on the hard drive. Sybex Linux + Study Guide: Chapter 1. Apache and Squid C. C. Upgrade the computer's memory to at least 64 MB. The partitions can be created during the installation. There are more utilities to expand an ext2 partition than partitions with the ReiserFS file system. Question: 127 What services would need to be installed to build a combination Web server and Domain Name Server (DNS)? A. Defragment the drive using the computer's current operating system. Sybex Linux + Study Guide: page 542. Smith. Reference: Roderick W. Sybex Linux + Study Guide: page 56. Answer: C. D. B. Incorrect Answers: B. It is not necessary to create them before the installation. There are more utilities to expand an ext2 partition than partitions with the FAT32 file system. Reference: Roderick W. Explanation: The Linux web server software is called Apache and the Linux DNS software is called BIND. Reference: Roderick W. Incorrect Answers: A. Squid is a proxy server program and IPChains is a firewall program. Explanation: The first thing to do before installing any operating system is to ensure that the system hardware is compatible with the operating system. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 There are more Linux utilities to expand an ext2 partition than partitions with a different file system. IPChains is a firewall program. Squid is a proxy server program. D. There are more utilities to expand an ext2 partition than partitions with the HPFS file system. B. Smith. Question: 128 Which if the following should be done before installing Linux on a home computer? A. ipchains and BIND D. Smith.

MySQL is a Linux database program. Squid B.org/ Incorrect Answers: A.org/ Incorrect Answers: A. IPChains is the Linux Firewall software. MySQL C. Sendmail is a Linux email server program. It does not provide web proxy services. NFS B.apache. Reference: http://www. It does not provide web server services. Reference: http://www. D. The hard drive will be partitions and formatted during the installation and therefore will not need defragmenting. ipchains Answer: B. Web server software is needed to enable employees to access office information through their web browsers. Apache D. BIND D. Squid C. It does not provide web server services.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. B. What device identifier needs to be used during configuration? A. It does not provide web proxy services. Question: 129 Which of the following services would need to be installed and configured in order to provide proxy and caching services to a Linux network? A. C. Explanation: Apache is the Linux web server software. D. Question: 130 A customer wants internal office information to be accessible by employees through a Web browser. /dev/lp0 B. Which of the following Linux services should be used? A. Squid is the Linux web proxy software. /dev/lpa Page 39 of 217 . Explanation: Squid is a full featured web proxy program running on Linux or Unix.squid-cache. BIND is the Linux DNS software. Sendmail Answer: C. NFS is the Linux Network File System used for sharing files over a network. It does not provide web server services. It does not provide web proxy services. Question: 131 A user wants to set up his parallel port printer on the workstation's first parallel port.

edit fstab B. Explanation: Hardware devices are identified in the /dev 'folder'. Incorrect Answers: B.conf file. Sybex Linux + Study Guide: Page 218. /dev/tty0 Answer: A. Tty signifies a modem. therefore the first parallel port would be listed as /dev/lp0. edit lilo. D. Smith. Document and log standards and changes to the systems. D. The first parallel port number is zero. it does not write a Linux boot loader into the master boot record. It does not restore the master boot record. The first one being zero. Question: 133 Which of the following actions will provide the greatest benefit to system administration in a large organization? A.conf file. such as RPMs.conf C. LILO needs to be run only after editing the lilo. Print out script source files. Install all packages from the same source type. Answer: C. Incorrect Answers: A. Parallel ports use the 'lp' identifier followed by the number of the port.conf file into an installed boot loader.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. run "fdisk /mbr" D. Update packages and kernels as updates are released. Sybex Linux + Study Guide: Page 548/9. Parallel ports use lp followed by a numeric identifier. you can instruct LILO to recreate the linux boot loader in the master boot record. C. run "/sbin/lilo" Answer: B. Question: 132 A user has overwritten the master boot record. Lp1 signifies the second parallel port. However. Explanation: Page 40 of 217 . Reference: Roderick W. /dev/lp1 D. Reference: Roderick W. The fstab file instructs Linux which partitions to mount and where to mount them. Explanation: LILO (the Linux boot loader) consists of a program that converts the lilo. Fdisk/mbr will write a new master boot record. by editing the lilo. C. B. Smith. The first parallel port number is zero. C. not a parallel port. Therefore. D. How could the Linux record be restored? A.

the administrator does the following: root@linux> cd /usr/local/bin root@linux> a. this is an unlikely situation. B. Linux requires modems that use the Rockwell chipset./" means to go Page 41 of 217 . When you precede the command with "/". the modem does not respond. The installed kernel does not support Winmodems.out B.user. ". chown root a. B. Linux has limited support for these modems. chmod o-x a. Explanation: When computers are supplied with internal PCI modems. D. You must precede the command with "/" or ".out. D. Question: 134 A new computer came preconfigured with an internal PCI modem. so the program would need to be in the path. D. Incorrect Answers: A. Printing out scripts would not aid system administration. The modem is not Hayes compatible. Reference: http://www.out bash: a.out C. you are running the program from the root directory. the modems are usually Winmodems.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 It is highly recommended that you document the systems and company standards.out: command not found What command should be issued to start the program? A. Linux does not support internal modems. Sybex Linux + Study Guide: Page 438. Packages can be installed from various source types as long as the installations are documented. Reference: Roderick W. Explanation: You cannot run a command if you are in the same directory as the program. C. /a. Most modems are Hayes compatible and therefore./".linmodems.out D. Question: 135 A system administrator is logged into a system as root.org/ Incorrect Answers: A. When trying to run the command /usr/local/bin/a. Smith. Linux does have limited support for internal modems. Rockwell chipsets are not a requirement for modems running under Linux. Package and kernel updates should be thoroughly tested before being installed. B. su . a. Which of the following is most likely the cause of the problem? A. After Linux was installed. Answer: C.out Answer: A.

ypconfig D.oreillynet. D. so changing accounts is unnecessary. Sybex Linux + Study Guide: Page 573. ypwhich displays the NIS server for the local machine. Explanation: The modprobe -r command is used to remove modules. Smith.out. Reference: Roderick W. insmod C. The chown command is used to change ownership of a file. Ypconfig is not the correct command./" would go back to the /usr/local folder and run the command /bin/a. C. C. Modprobe with no options loads a module. The question states that you are already logged in as root. Question: 137 Which command will verify that an NIS client is bound to an NIS server? A. Modconfigurator Answer: C. Reference: http://www. Modprobe -k is used to autoclean the modules.client Answer: A. The chmod command is used to modify the permissions on a file. Explanation: The ypwhich command returns the hostname of the NIS server. Sybex Linux + Study Guide: Page 432. Incorrect Answers: A. It is not required here. Modprobe -a lists all the modules. list. For example. The su command is used to run a command under a different account. lsmod B. Insmod can only insert a module. There is no modconfigurator command. modprobe D. Without arguments.com/linux/cmd/y/ypwhich. Lsmod can only list the modules. Nisbind is not the correct command. Incorrect Answers: B. B. ". as well as autoclean? A. Page 42 of 217 . Smith. ypwhich B. Reference: Roderick W. nis. in this question. This is unnecessary because you are running the command as root. D. Question: 136 Which utility can remove. and add modules.html Incorrect Answers: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 back one level in the directory structure and run the command from there. nisbind C.

C.168. nslookup www. Reference: http://www.conf is the wrong filename. root.conf file. Incorrect Answers: B. telnet 168.html file.conf file is in the /etc directory. Systemlog.client is not the correct command.root file.168.redhat. /usr/syslog. httpd. Question: 139 In an Apache default installation. The DocumentRoot parameter is specified in the httpd.conf file for their configurations. Explanation: Apache is the Linux web server software. ftp. ping 168.168.18 D. Systemlog. not the apache.conf file for its configuration.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Reference: Roderick W.conf is the wrong filename.168. /usr/etc/systemlog. The syslog. Explanation: Most system logs are maintained by the system log daemon and the kernel log daemon.conf C. Nis. The DocumentRoot parameter is specified in the httpd.conf Answer: B.conf C. httpd.html B.18 C. /etc/syslog.conf file. not the root. not the /usr directory. D.root D. apache. which of the following configuration files contains the DocumentRoot? A. C. The Document root parameter specifies the default location for the web pages. Question: 138 Which of the following files would modify the daemon which logs system activity? A.conf file.1-Manual/ref-guide/s1-configuration-config.com/docs/manuals/linux/RHL-7.org Page 43 of 217 .conf file.conf D.conf Answer: A.org B.comptia. /etc/systemlog. Sybex Linux + Study Guide: Page 292.conf B. Smith. The DocumentRoot parameter is specified in the httpd. Question: 140 How should an administrator test that Domain Name Services (DNS) are working correctly on a client workstation? A. not the httpd. It uses the httpd.comptia. These services rely on the /etc/syslog.html Incorrect Answers: A. D.

The first '0' means that the CD-ROM shouldn't be backed up and the second '0' means that the CD-ROM file system shouldn't be checked for errors when the machine boots. Answer: A. Exploitation of services that are started with TCP wrappers. C. Incorrect Answers: A. An "fstab" entry that lets any user mount the CD-ROM.allow will protect the server from intruders that attempt which if the following? A. Pinging an IP address will not test DNS. Iso9660 is the file system for the CD-ROM. D. Inside Linux: Page 195. C. noauto 0 0 What is this entry? A. The noauto option prevents the CD-ROM being mounted at boot time. Exploitation of ICMP security holes. user. The line is from the fstab file. It is not a command that will test DNS. C.org if the DNS is correctly configured on the workstation and the DNS server is functioning correctly. Noauto means that the CD-ROM won't be automatically mounted when the system boots. The 'user' option allows any user account to mount the CD-ROM.comptia. Question: 142 Configuring hosts. D. An "fstab" entry that mounts a CD-ROM as a read-only device at boot time. Page 44 of 217 .org is the FQDN for a machine called ftp in the comptia.comptia. An "mtab" entry that mounts a CD-ROM as a read-only device at boot time.org domain. C. Explanation: The nslookup utility is used to query a DNS server. Smith. Attacks from machines using IPX/SPX. Reference: Michael J. Ftp.comptia.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D. Incorrect Answers: B. not the mtab file. Reference: Roderick W. Question: 141 Review the following entry: /dev/cdrom /cd iso9660 ro. Tobler. B. An "fstab" entry that allows only root to mount the CD-ROM. B. Sybex Linux + Study Guide: Page 400/1. New Riders. D.org" will return the IP address of www. Explanation: This entry in the fstab file allows any user to mount the CD-ROM (/dev/cdrom) in the /cd directory. The command "nslookup www.deny and hosts. Telnetting an IP address will not test DNS. B. Attacks from machines using TCP.

TCP Wrappers then authenticates the request by using the hosts. Question: 144 Which of the following commands is used to associate a logical 32-bit or 128-bit IP address with a physical Ethernet device? A. not IPX/SPX. What diagnostic tool can be used to test the modem? A.allow and hosts.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D. mount D. Page 45 of 217 .com/catalog/debian/chapter/ch11_07. not TCP.deny files.deny files. D. inetd hands the request to TCP Wrappers. mgetty B. Mgetty is not used to test modems. used for testing PPP connections (Modems use PPP to connect to the Internet via an ISP).allow and hosts.deny and hosts. Sybex Linux + Study Guide: Page 363/4.deny files. not ICMP. When a server service is requested.allow files and starts the server service if the requesting client has permission. A web browser Answer: B. Reference: http://www. arp B. TCP Wrappers use the hosts. C. but it can't test the actual modem. Smith. Explanation: Inetd is a service that listens for network connection and starts a requested server service. Explanation: Minicom is a graphical utility that runs in a console. Question: 143 A user has installed and configured an internal modem to connect the workstation to the Internet. Explanation: ARP (Address Resolution Protocol) is used to map hardware addresses (sometimes referred to as MAC addresses) to IP addresses. Reference: Roderick W. PPPconfig is not used to test modems.oreilly. Inetd can use a service called TCP Wrappers to start the server services. route Answer: A. Incorrect Answers: A. A web browser could be used to test Internet connectivity. C. B. TCP Wrappers use the hosts. minicom C. masq C.allow and hosts. pppconfig D.html Incorrect Answers: A. TCP Wrappers use the hosts. The user claims that the modem is not connecting properly.

lilo D. find B. Sybex Linux + Study Guide: Page 461. Smith. . The mount command is used to mount a hardware device. Lilo is the Linux boot loader. uptime Answer: B. The route command is used to add a static route to a routing table. with several services unresponsive. Explanation: The grep command can search the contents of files for a specific string.com/linux/cmd/a/arp. Question: 145 A Linux system seems to be unstable. It is not used to associate hardware addresses with IP addresses. It does not check the file system for errors. Explanation: An unstable system could be caused by file system errors. Smith. Incorrect Answers: A. C. Question: 146 Which of the following commands searches the contents of files for a specific string? A. Masq is not used to associate hardware addresses with IP addresses. Sybex Linux + Study Guide: Page 653.oreillynet. search D. sync B. Before rebooting. C. It does not check the file system for errors. Incorrect Answers: Page 46 of 217 . Uptime is a utility that displays the uptime of a system (the time a system has been running).html Incorrect Answers: B. which of the following commands could be entered to help ensure the system restarts into a stable state? A. whereis Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. It is not used to associate hardware addresses with IP addresses. Reference: Roderick W. fsck C. Sync is used to ensure file system integrity when shutting down a machine. D. grep C. The fsck (File System Check) command will check the file system for errors. Reference: Roderick W. D.

B. If the problem is caused by a known issue. inetd Answer: D. The whereis command is used to locate the binary file. Incorrect Answers: A. The application is installed and tested. The application suddenly hangs. Page 47 of 217 . C. It does not search the contents of the files for a specific string. but it won't affect the Telnet problem. D. Explanation: To troubleshoot a faulty application. Check any error log generated by the application and the manufacturer's Website for known \ issues or patches. The application may not generate an error log in this path. Go to /etc/log/<name of application>. Restarting the POP3 service may solve the POP3 problem. The application may not generate an error log in this path. Answer: D. C. lmap B. These services are controlled by the inetd service. Reference: Roderick W. the problem will reoccur after reinstalling the application. Explanation: POP3 and Telnet are two separate server services. Restarting the snmp service won't affect the POP3 and Telnet services. Question: 148 A customer reports that his server will not allow users to retrieve their email through POP3 or connect to the server via telnet. D. source code or manual pages for a specified command. Smith. pop3 D. snmp C. The find command is used to search for files that meet specified conditions (such as type). Question: 147 A system is built for a new employee who needs a particular application for computing critical data. Sybex Linux + Study Guide: Page 286. you should look for any error messages in the logs and go to the manufacturer's website to see if the problem is a known issue or if there is a patch (update) for the application. Incorrect Answers: A. The search command does not search the contents of the files for a specific string. Reinstall the application and restart X. After killing the process. C. It does not search the contents of the files for a specific string.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. What service needs to be restarted? A. which of the following is the best course of action to take? A. B. C.log to read the error messages. Go to /usr/local/apps/logfile to access specific information. It is unlikely that the POP3 and Telnet services would both fail at the same time. It is more likely that the problem lies with the inetd service. B. Restarting the inetd service should rectify the problem. Restarting the lmap service won't affect the POP3 and Telnet services.

Explanation: Most system log files are stored in subdirectories of the /var/log directory.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 149 What are the full paths to the general log files that can be accessed to find out how a system is running? A. /usr/local/install. This file was created when the root account security was breached.html Incorrect Answers: A.log /var/log/install. Smith. C. D. He finds a file in his home directory that he has never seen before. /var/log/messages /var/log/mail /var/log/wtmp B.wbglinks. This file would not be generated by Cron.log /usr/local/messages /tmp/boot. Incorrect Answers: B. Reference: Roderick W. These are the wrong paths to the system log files. B. These are the wrong paths to the system log files. The file is included in most common distributions. It has the following permissions: -r-sr-srwk 1 root root 531 Jan 19 02:15 shell. The root account put the file there for his use. /var/spool/logs/messages /var/spool/logs/dmesg /var/spool/log/install. These are the wrong paths to the system log files. /etc/bootlog. Explanation: The file is owned by the root user account and the root group account.log D.log Answer: A. Reference: http://www. C. The file is not included in users' home directories in most distributions.run Where did the file come from? A. The file was generated by cron. Question: 150 A user notices some problems with his Linux system.net/pages/reads/linux/filepermissions.log /etc/boot/messages C. Page 48 of 217 . Answer: B. C. D. Sybex Linux + Study Guide: Page 293.

To stop multiple instances of a process.exp for incompatibilities. C. Stop the Web server by using "kill -9 <pid>" and run fsck to make sure the /home httpd partition is functioning properly. Reference: Roderick W. Question: 151 A customer calls the support desk and complains that her company's Web server is not responding to requests from Web clients. D. There are multiple instances of the httpd service that need to be stopped before restarting the service. you would use the 'killall' command. Answer: B. Use "/usr/sbin/httpd -r" to restart the Web server. Stop the Web server by using "killall http" and restart it using "/usr/sbin/httpd". C. Explanation: Server service (such as HTTPd) problems can usually be resolved by restarting the service.misc 462 ? S 0:00 /usr/sbin/automount " "timeout 60 /net yp /auto.statd 796 ? S 0:00 gpm -t ps/2 814 ? S 0:00 httpd-perl -f /etc/httpd/conf/httpd-perl. D. It will not stop multiple instances of a process. she responds that the server has not been reconfigured recently and normally performs without problems.conf 1721 pts/1 R 0:00 ps -x What is the best way to resolve this issue? A. When asked about recent work done on the machine.net 526 ? S 0:00 syslogd ~m 0 579 ? S 0:00 crond 595 ? S 0:00 xinetd ~reuse ~pidfile /var/run/xinetd.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Sybex Linux + Study Guide: Page 519. The kill command is used to stop a single instance of a process. A root account security breach would not generate this file. B. The output above shows that there are numerous instances of the httpd service. Page 49 of 217 . Restarting the httpd service should be the first step to resolving the problem.pid 625 ? SW 0:00 [lockd] 636 ? SW 0:00 [rpciod] 646 ? S 0:00 rpc. Incorrect Answers: A. A process list on the machine gives the following result: PID TTY STAT TIME COMMAND 1 ? S 0:04 init 444 ? S 0:00 /usr/sbin/automount " "timeout 60 /misc file /etc/auto. Smith.conf 955 ? S 0:00 httpd 956 ? S 0:00 httpd 957 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 1080 tty1 S 0:00 /sbin/mingetty tt /etc/httpd/conf/http-perl. Examine the httpd module list in /etc/httpd/modules/httpd.

This loads the server which prevents it communicating on the network. Smith. Run "version elm" D. The information will include the installed files and their versions. Explanation: A Denial of Service (DoS) attack is where multiple connection requests are made to a server without completing the connection. The version elm command is an invalid command. Sybex Linux + Study Guide: Page 178.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 152 A user executed a Pearl script that initiated a connection request to a server without ever completing the network connection. Explanation: The rpm -q command will query a package for information.5. C. Denial of Service Answer: D. New Riders. Inside Linux: Page 385. Question: 154 What does the command "rpm -Uvh package-update-3. Question: 153 A user wants to have the latest version of elm installed. Reference: Roderick W. C. A buffer overflow is not described in the question. A Trojan horse is a method used to gain entry to a system. Trojan horse C. Which of the following will identify the currently installed version? A. Run "rpm -q elm" C. D. Spoofing B. What kind of attack was initiated? A. Reference: Michael J. The man elm command will display the manual pages for the elm program. It will not identify the currently installed version. Tobler. This is not described in the question. Checking the log files for the rpm package will not identify the currently installed version of Elm. B.i386. Run "man elm" B.rpm" do? Page 50 of 217 . Incorrect Answers: A. This is not described in the question. Incorrect Answers: A. Check /var/log/rpm Answer: B. This was done multiple times until the server could no longer communicate on the network. Spoofing is sending data from a 'fake' network address. Buffer overflow D.

The application does not have sufficient rights to write the directory specified. Verifies that the package is installed correctly and reports errors. C. The 'e' option is used to uninstall a package. Inside Linux: Page 340. where is the best location to maintain documentation of work performed on Linux servers at a site? A. The 'v' option is for verbose mode. B. The 'vf' option is used to verify an installation. Incorrect Answers: A. Change the application to write its error logs into the /root directory. Set User ID (SUID) is used to run a program as the user who owns the program (usually root) rather than the user running the program. New Riders. Only the application within it needs to run as root. In a text file kept on a Linux file server. Allows the user to view hidden files installed with the package. Explanation: It is most likely that the application does not have sufficient rights to write the directory specified. The command does not display hidden files. D. Upgrades the package and provides installation status. Change the Web server user to 'root' so that applications run within it will run as root. C. Change the permission and ownerships of the application to match the user group of the Web server. D. Off-site at a different facility. Answer: B. The application needs to run as root. Reference: Michael J. Tobler. It is a security risk to have the entire web server running as root. Question: 156 Based on best practices. In a binder in the server room. The package will still be installed if no previous versions exist. Sybex Linux + Study Guide: Page 254. Answer: D. it is desirable to have applications writing their error logs to the usual log file location. it is discovered that the application is not writing its error to the Web error log properly. This provides the installation status. Question: 155 An application is created that is called through the Web server. B. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. It would need root permissions to write to the root directory. Incorrect Answers: A. Explanation: The rpm -Uvh command upgrades a package. so the suid bit on the application must be set to allow it to run as root. Also. upon restarting the Web server. C. Smith. D. However. Page 51 of 217 . Which of the following methods would resolve the problem? A. B. Uninstalls the package and related hidden files. Reference: Roderick W. C. B.

Sybex Linux + Study Guide: Page 245. fdisk /dev/fd0 C. C. mkfs /dev/fd0 B. A group account with an ID of zero is a root group. mount -f /mnt/floppy D. Question: 157 A system administrator has written a script that scans the password file for "unusual" things. Reference: Roderick W. mkfs -t vfat /mnt/floppy Answer: A. B. The documentation should not be kept on a computer. The documentation should be easily accessible by the network administrators. A group account of 'wheel' does not pose a security risk. A group ID number that has been set to zero. C. A user with the default group of 'wheel'. /dev/fd0 is the first floppy disk on a Linux system. Reference: Page 52 of 217 . B. Question: 158 Which of the following would correctly format a 3. An unusual name does not create a security risk.5" diskette? A. Reference: Roderick W. For which of the following should the script check? A. Smith. easily accessible by the network administrators. In a text file on the local machine where the changes were made. Explanation: Intruders usually create a user account with the ID number set to zero. Explanation: The documentation should be kept in a safe place. Smith. in case the computer fails. D. However.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Explanation: The mkfs (make file system) command is used to format a disk. A user with an unusual account name. The documentation should not be kept on a computer. Incorrect Answers: B. A user ID number that has been set to zero. D. D. A user account with a user ID of zero has root privileges. Sybex Linux + Study Guide: Page 438. Answer: C. in case the computer fails. Incorrect Answers: A. it would be better to look for user accounts with an ID of zero. Answer: A.

sh C. Smith. netcfg C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. Reference: Michael J. The 1 signifies 01:00 (1. not formatting a floppy disk. The 'at' command can schedule a program. Also. The information will include the operational status of the interfaces. D. You should use the msdos option. Sybex Linux + Study Guide: Page 335. Question: 159 The administrator wants to use /sbin/special. Incorrect Answers: Page 53 of 217 . cksum B. C. Inside Linux: Page 408/9. then /sbin/special. The 'at' command can schedule a program. The syntax is incorrect. Explanation: The ifconfig command will display detailed information about an interface. but it will only run once. Add "1 1 13 ** if [ 'date' == "Frid" ]. but it will only run once. the program will run at 01:05 (5 past 1 in the morning). The 5 signifies a Friday. 13" < /sbin/special.sh fi " to his crontab Answer: C. New Riders. The * signifies any month. Incorrect Answers: A. Incorrect Answers: B. Explanation: The crontab is used to schedule a program such as a backup program. The mount command is used to mount a drive. Fdisk is used for partitioning a hard disk.00 a.sh to do a backup every Friday the 13th. siginit D. Smith. not to format a floppy disk. the syntax is incorrect. Add "5 1 13 * 5 /sbin/spcial. B.). Run at 'date | cut -d -e \f3' /sbin/special. Also.sh B. The first 5 signifies 5 minutes past the hour. The 13 signifies the date of the month. Sybex Linux + Study Guide: Page 459-460. What would be a solution? A. This means that if the 13th day of a month is a Friday.m. Run at "Fri. D. Question: 160 Which of the following commands is used to determine if network interfaces are up and running? A.sh " to his crontab D. ifconfig Answer: D. the syntax is incorrect. Reference: Roderick W. Tobler. Vfat is the wrong file system for a floppy disk.

B. Shielded Twisted Pair (STP) cable uses copper wires and is therefore susceptible to electromagnetic interference. Explanation: If a Linux installation continuously locks up. It is not necessary to install the network card prior to an installation. As it uses no copper wires. RG-68 Coaxial Cable D. D. C. Page 54 of 217 . Question: 163 Under which of the following hardware upgrades would a system NOT have to be rebooted? A. Wireless data transmission is susceptible to electromagnetic interference. B. Answer: B. Remove all unnecessary hardware. Cksum is used to calculate a Cyclic Redundancy Check to check a file for errors. Question: 162 If the Linux installation process continuously locks up.ac. Enable power management in the BIOS.abdn. C. Fiber Optic Cable B. Shielded Twisted Pair (STP) Answer: A. C. Reference: http://www. Encrypted Wireless C. To troubleshoot this. than resolve them. C. Ensure that the network card is installed prior to the installation. you should remove all unnecessary hardware. Repartition the drive. D. Replacing a PS/2 mouse. it is likely that a hardware device is incompatible with Linux.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Coaxial Cable uses copper wires and is therefore susceptible to electromagnetic interference. Netcfg is not used to determine if network interfaces are up and running. Incorrect Answers: A. and add the hardware one device at a time. Question: 161 Which of the following is LEAST affected by electromagnetic interference (EMI)? A. Explanation: Fiber Optic cable uses pulses of light along a glass fiber to transmit data.html Incorrect Answers: B. It is less susceptible to EMI than UTP (unshielded twisted pair) because the copper wires are shielded.erg. to discover the incompatible device. It is not used to determine if network interfaces are up and running. Adding a USB CDROM drive. it is immune to electromagnetic interference. Upgrading the CPU. which of the following should be done? A. C. Power management is more likely to cause problems. Repartitioning the drive will not resolve the problem. D.uk/users/gorry/course/phy-pages/fibre. Siginit is not used to determine if network interfaces are up and running. B.

Answer: C. CMOS B. the BIOS reads configuration information from the CMOS. IEEE-1394 port D. video and I/O boards are installed in a PC. Reference: http://www. Incorrect Answers: A. Boot strap Answer: A. The BIOS and CMOS are hardware and are not related to the operating system which is software. This means that you can disconnect and reconnect USB devices without needing to reboot the system. Question: 164 Which of the following connectors is hot pluggable? A. Ultra2 SCSI external connector Answer: C. Sybex Linux + Study Guide: Page 402. POST C. D. Parallel ports are not hot pluggable. Explanation: One of the features of USB devices is that they are 'hot swappable'. Reference: Page 55 of 217 . Explanation: The CMOS chip is the 'configurable' part of the BIOS.com/firewire/ Incorrect Answers: A. Serial ports are not hot pluggable. Explanation: An IEEE-1394 port is a firewire port. Smith.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Serial port B. B. which of the following allows the installed card to be integrated with the current system on a hardware level? A. Parallel port C. Question: 165 When SCSI. RAM can only be installed when the system is shut down. Reference: Roderick W.apple. This is a relatively new technology provide high data transfer rates and is hot pluggable. When the computer boots. A PS/2 mouse may not work if it has been replaced without rebooting the machine. The CPU can only be changed when the system is shut down. B. Installing additional RAM. Ultra2 SCSI ports are not hot pluggable. D. BIOS D.

Smith. D. If the driver wasn't installed. Page 56 of 217 . none of the two devices will work. A driver is not installed Answer: A. Explanation: SCSI devices use SCSI identifiers (IDs). A memory conflict D.com/ Incorrect Answers: B. C. not EDO memory. The SCSI devices don't have separate IRQs. The beep code indicates there is no memory. Incorrect Answers: B. Parity memory is required C. The previously added devices would still work. Boot Strap is the process of a computer booting up. not Fast Page Mode memory.com/showdoc. Reference: http://www. Fast Page Mode memory is required D. He adds another external device. and this device and one of the internal devices do not work. D. The POST (power on self test) is the process of the BIOS checking the system for installed hardware during system boot up. Explanation: Parity memory boards have an extra chip for parity checking. A memory conflict is less likely than an ID conflict. the PC does not boot and beeps several times. Sybex Linux + Study Guide: Page 32. Each device must have a unique SCSI ID to function correctly. The SCSI controller (to which the SCSI devices are attached) uses one IRQ.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 http://www. The extra chip indicates parity memory. The BIOS cannot be directly configured. only the recently added device would not work. Question: 167 After the failed memory has been replaced. Question: 166 A user has three SCSI devices (two internal and one external) connected to his computer. It reads its configuration information from the CMOS. The technician observes that the old SIMMs use 9 chips while the new SIMMs only use 8 chips.wimsbios.html?i=113&p=6 Incorrect Answers: A. Which of the following is the most likely cause? A. C. AN IRQ conflict C. EDO memory is required B. An ID conflict B. If two devices have the same ID. The extra chip indicates parity memory.anandtech. Reference: Roderick W. C. Unregistered SDRAM memory is required Answer: B. What is most likely the problem? A.

If the power cable wasn't connected. C. The light on diskette drive is broken. The option to disable or enable parity checking is common. C. the light wouldn't come on at all. Explanation: The mouse type is not a common BIOS option although the PS/2 mouse PORT is often mentioned. Question: 169 A user has just installed a new 3. Mouse type B. IR B. He turns the computer on and discovers that the diskette drive light stays on all the time. not SDRAM memory. Hard drive auto-detect Answer: A.5 inch or 5. B. D. Page 57 of 217 . Answer: D. it wouldn't come on at all. (3. Question: 168 All of the following are common BIOS options EXCEPT A. The BIOS default would most likely have the correct size (3. D. The extra chip indicates parity memory. The only configurable floppy drive option is the size.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Reference: http://www.computerhope.com/issues/ch000278.5 inch) configured.5" diskette drive in his desktop computer. Floppy drive type D. The option to disable or enable hard drive auto detection is common. The power cable has not been connected properly. The floppy drive type. B. The ribbon cable is inserted backwards in the drive. What is the most likely reason the light stays on? A. Question: 170 Which network interface card has BNC connector on it? A. If the light was broken.25 inch) is a common option. Explanation: Inserting the ribbon cable backwards is an easy mistake to make and often causes the symptoms mentioned in this question. The system BIOS is misconfigured.htm Incorrect Answers: A. Incorrect Answers: B. Thinnet C. Twisted pair Answer: B. Parity/non parity C. C. Fiber optic D.

Explanation: The resources for the legacy devices should be reserved in the CMOS.sid7_gci211681. D. Which of the following should be done to ensure the proper operation of all hardware on the system? A. It is not necessary to replace the BIOS. Replace the BIOS with a non-Plug-and-Play BIOS. This will prevent the resources being dynamically assigned to plug and play devices. C. Twisted Pair does not use BNC connectors. D.com/sDefinition/0.techtarget. C. which would cause a resource conflict.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Thinnet (otherwise known as 10Base2) uses the BNC connector. Smith. IR (infra-red) is a wireless technology and therefore uses no connectors. some legacy hardware (non-Plug-and-Play) is required. It is not necessary to enable IRQ routing in the BIOS.00. B. Enable IRQ routing in the BIOS. Question: 171 On a Plug-and-Play system. Reference: Roderick W. Reference: http://www. If the battery fails. Fiber Optic does not use BNC connectors. It is not necessary to replace the devices. the CMOS will need to be reconfigured. MBR settings B.. C. Reference: http://searchnetworking. Answer: C. Data on each partition Answer: B. Sybex Linux + Study Guide: Page 30. Replace the legacy devices with current Plug-and-Play devices.html Incorrect Answer: A. Explanation: The CMOS relies on a battery to 'remember' its configuration. POST settings D. B.com/show/motherboards/80/ Incorrect Answers: Page 58 of 217 .pcmech. Incorrect Answers: A. Which of the following will need to be reconfigured to get the system working after replacing the battery? A. Reserve the resources in CMOS for the legacy hardware. CMOS settings C. Question: 172 A battery fails in a Linux workstation.

Question: 175 Page 59 of 217 . and CDROM drive. Which of the following IRQs is likely to be conflicting and causing the problem? A. C. D. It is unlikely that a faulty CD-RW would degrade the system performance. The user then reports the system is taking longer to load applications. Smith. D. IRQ 5 is commonly used by sound cards. D. Inside Linux: Page 137. Incorrect Answers: A. 7 D. as it is damaged. C. The data on each partition is written to the hard disk and does not rely on battery power. Reference: Michael J. C. IRQ 7 is commonly used by the parallel port. Sybex Linux + Study Guide: Page 31. Switch the CD-RW to cable select. 13 Answer: A. 5 C. Using cable select will not improve system performance. The hard disk is always on the primary IDE controller. Question: 173 A user adds a new CD-RW to an existing system with a diskette drive. Explanation: Serial devices use COM ports. 4 B. Reference: Roderick W. single IDE hard disk drive. CD-R accelerator software may improve the CD-R performance. Install CD-R accelerator software. Moving the CD device to the secondary IDE controller will improve performance without the need for extra software. System performance can be improved by installing CD devices on the secondary IDE controller so that they are separate to the hard drive.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Replace the CD-RW drive. Answer: D. IRQ13 is used by the Math co-processor. C. Question: 174 A system's serial device is not operating correctly. Explanation: Most systems come with two IDE controllers. but it won't improve the overall system performance. B. New Riders. Tobler. The MBR settings are written to the hard disk and do not rely on battery power. COM ports 1 and 3 use IRQ 4. B. Move the CD-RW to the secondary IDE controller. The POST settings are in the BIOS which does not rely on battery power. Incorrect Answers: B. Which of the following will most likely resolve the problem? A.

Question: 177 Which device commonly uses the ATAPI interface? A.tstc. then the driver is already installed and does not need reinstalling. Reboot the system. C. 4 C. Now the diskette drive is not responding. D. not 4. 2 B. This does not need to be configured in the CMOS. C. 7 Answer: D. not 2. Set up hot-swapping capabilities in CMOS.html Incorrect Answers: A. the first troubleshooting step would be to remove the device and reinstall it. Remove the drive and reinstall it. Modem B. B. Answer: C. This is usually ID 7. Question: 176 Which if the following IDs should be avoided when assigning IDs to SCSI peripherals? A. Page 60 of 217 . Laptop PCMCIA devices are hot swappable. It may not be necessary to reboot the system. Video card D. Network card Answer: B. Try refitting the device first. CD-ROM C. D. 5 D. B. Explanation: SCSI devices need separate SCSI IDs. Explanation: CD-ROM devices commonly use the ATAPI interface. The SCSI controller usually uses SCSI ID 7. Reinstall the driver. If the device worked before. not 5. Incorrect Answers: A. Reference: http://cmtunix. The SCSI controller usually uses SCSI ID 7. The SCSI controller usually uses SCSI ID 7. Explanation: If a device doesn't work after hot plugging it into a mobile system.edu/database/hardware/scsi. B. The SCSI controller itself uses a SCSI ID.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user has just hot-swapped the CDROM with the diskette drive in his mobile system. Which of the following actions will correct the problem? A.

A patch should be tested on a secondary system before installation on a production system. Answer: C. C. Incorrect Answers: A. Page 61 of 217 . You need the ATDT command.htm#Hayes%20AT%20Commands Incorrect Answers: A.za/hayesat. Apply the patch immediately to the production system. B. because security patches need to be installed right away. B. A patch may introduce errors and conflicts. ATDT4323604 D. Incorrect Answers: A. Video Cards commonly use the AGP interface. Sybex Linux + Study Guide: Page 203. but this is why should test it first on a secondary system. Reference: http://www. Network cards commonly use PCI interfaces. Which of the following is the best practice. because they may introduce errors and conflicts. Reference: Roderick W. not the ATM command D. Which of the following AT commands can be used to have the modem dial 432-3604? A. Question: 178 A user believes that his telecommunications software is not dialing his modem properly. to validate the patch under normal system operation. not the ATAPI interface. AT4323604 B. not the ATAPI interface. not the ATAPI interface. You need the ATDT command. Apply the patch during business hours. not the AT command. if any. Modems commonly use the serial interface. ATM4323604 C. Explanation: The ATDT<number> command is used to have a modem dial a number. for updating this patch on a production system? A. Explanation: Any new software or software patch should be installed on a secondary system and thoroughly tested before installation of production systems. AT4323604DT Answer: C. not the AT command Question: 179 A Linux vendor has recently come out with a necessary patch to the server software to improve security on the server. D. Smith. Apply the patch onto a secondary system to test the patch before installing it on a production machine. C. Smith. Sybex Linux + Study Guide: Page 24.option. D. Never apply patches on production servers. You need the ATDT command.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W.co. B.

Uptime is a utility that displays how long the system has been running for. Dmesg displays the text that was displayed when the system booted.readme Incorrect Answers: B. Run dmesg to review the log file. Therefore. You should look here to see if you can discover what is causing the system to crash. Question: 182 A system has a utility that is regularly updated with new versions. D. Rather than overwriting the older versions. Answer: A. not the processors. Dmesg is a utility that displays the text that is displayed during system startup.org/modules/by-category/04_Operating_System_Interfaces/Linux/Linux-Cpuinfo1. If the output contains information about only one processor.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. You need find out what caused the system to crash before the reboot was necessary. Run ps to see if both CPUs appear. C. How could this be verified? A. D. Explanation: Cpuinfo is a utility that displays information about all running processors on a system. B. then only one processor is working. Ps lists the running processes. they keep older versions Page 62 of 217 . Look in /etc/shutdown D. Run uptime C. C. Run dmesg B. A non-functional processor would generate any error messages in the error logs. Question: 181 After installing Linux onto a dual-processor machine. C. Explanation: Most applications write error messages to files in the /var/log/messages directory. Smith. Question: 180 A Linux system crashes every day at the same time and needs to be rebooted. Check /var/log/messages for errors.cpan. This will not contain any information about a non-functional processor. Sybex Linux + Study Guide: Page 613. they need to be retained for testing purposes. Look in /var/log/messages Answer: D. the administrator suspects that only one processor initialized successfully during the boot process. Run cpuinfo B. Reference: Roderick W.5. Security patches should be installed as soon as possible. Error messages are not written to this file or directory. Incorrect Answers: A. Which of the following would provide evidence of what was happening on the system at that time? A. Reference: http://www. but not before testing on a secondary system.

Question: 184 When dial-up users are able to connect to the dial-in Linux server but are unable to authenticate. when a user types 'utililty'. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 in the following format utility1. Smith. A high ID would not slow the machine. Answer: C. This can usually be fixed by restarting the process. What information from the ps command would suggest that a process is problematic and must be killed? A. C. A high memory percentage. Incorrect Answers: A. Reference: Roderick W. Question: 183 A machine that usually executes its tasks very quickly becomes remarkably slow. A copy of the latest version of the program should not be renamed 'utility' because other files that the program uses. Explanation: A symbolic link is like a shortcut. Reboot the server.4 utility1. The process ID is just an identifier for the process. Make a symbolic link from the latest version to "utility. D. might have links to the original program name. The PS command does not display the load average for the processor. B. Answer: A. A faulty process can be recognized by having a high CPU time. The symbolic link needs to point to the latest version of the program. Sybex Linux + Study Guide: Page 134. This means that a high percentage of the processor time is spent trying to run the process. Reference: Roderick W. which of the following should be done? A.3 utility1. A symbolic link named utility will open the file (program/utility) that the link points to. The latest version of the program should be renamed 'utility' because other files that the program uses. Incorrect Answers: B. B. Copy the latest version of the utility to "utility". Explanation: The PS command is used to display information about the running processes. Smith. A high load average.lnk". Make a symbolic link "utility" to the latest version. Move the latest version of the utility to "utility". A high process ID. B. D. The PS command does not display information about the memory. A high CPU time. might have links to the original program name. Page 63 of 217 . D.5 What is the best way the system can be set up so that users cam simply type "utility" to run the latest version of the application? A. C. D. Sybex Linux + Study Guide: Page 514.

B. D. D. the users would not be able to dial in. From linuxdocs. Check spooler for errors. Explanation: You must be logged in as root to install a program. If RAS wasn't running.2.org D. The spooler is for printing.3/en/os/i386/images/ Page 64 of 217 . Answer: A. It is a service that is used to authenticate dial in users.gnu.org/software/radius/radius. Change ownership of file to 'root' C.rpm file. just start the RADIUS service. While installing the file the following error is displayed: failed to open /var/lib/rpm/packages.redhat.html Incorrect Answers: A.5-0" as root. you can download Redhat Linux boot disk images from: ftp://ftp. Check that RAS is running. No rescue/boot disk is readily available. Run "rpm -i --nodeps zope-2. Question: 186 A Linux machine is not booting after a power outage. Answer: D. In /boot B. C. Run "rpm -i zope-2. Check that RADIUS is running. Incorrect Answers: B.5-0. It is not necessary to reboot the server. Answer: D. D. C.rpm What has to be done before the program will work? A.5-0" to bypass the error. C. Where could a rescue/boot disk be found? A. Question: 185 The system administrator is asked to install a file called zope-2. Explanation: RADIUS stands for Remote Authentication Dial In User Service.2. Return to the Website to receive an uncorrupted . The system was able to read the permissions. The file does not need to be owned by root.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. The administrator downloads the file and attempts to install it. B. In /root C.com/pub/redhat/linux/7.rpm.rpm: Permission denied error: cannot open /var/lib/rpm/packages. You cannot bypass a 'permission denied' error message. At the distribution's Website. not authentication.2. Reference: http://www. which means the file is not corrupted. to enable its installation. Explanation: You can download a rescue/boot disk from the distributions Website. For example.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Incorrect Answers: A. There are no boot disk images in /boot. B. There are no boot disk images in /root. C. Linuxdocs.org contains documentation, not boot disk images. Question: 187 Why is "netstat -nr" used in substitution of the route command when a network connection is not functioning correctly? A. "netstat -nr" displays the routing table without performing reverse name lookup. B. Route requests the network driver for data, but "netstat -nr" will display the kernel's routing table. C. The route command can be used if the network is functional. The "netstat -nr" displays only the local machine. D. Route will attempt to contact and verify the connections to each host in the routing table using ping. If the network fails, route will stop responding. Answer: C. Explanation: The Route command is used to display the routing table. If the network is not functional, the routing table will only contain static routes; it will not contain any dynamic routes. The netstat command displays information about the local machine whether the network is functional or not. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 373/4. Incorrect Answers: A. Netstat is used rather than route because netstat displays information about the local machine. B. Netstat is used rather than route because netstat displays information about the local machine. D. Route does not attempt to contact and verify the connections to each host. Question: 188 In order to control runaway processes, an administrator creates a cron job. Which of the following commands should be run so that he can scan the logs later? A. ps B. sar C. top D. tail Answer: C. Explanation: A 'runaway' process is a process that is using a high amount of CPU time. The 'top' command displays the processes that use the highest amount of CPU time. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 668. Incorrect Answers: A. The ps command displays all processes. We just need the processes with the highest amount of CPU time.
Page 65 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

B. There is no sar command. C. The tail command displays the processes with the lowest amount of CPU time. Question: 189 After setting up a cron job to backup a system to tape, the first few backups on the tape cartridge are successful. They then fail, reporting the "device is full." What could be the cause of the problems? A. Tapes can only be used once. B. The tape is not being erased. C. The tape drive needs to be replaced. D. Incremental backups need to be used. Answer: B. Explanation: If you're using a single tape to run scheduled backups, then the cron job will need to be configured to erase the tape before performing the backup. Incorrect Answers: A. Tapes can be used many times. C. It is unlikely that the tape drive is faulty and therefore does not need to be replaced. D. Incremental backups back up only the files that have changed since the last backup. These backups use less tape space but the tape will eventually fill up if it isn't erased. Question: 190 A new user has been issued a Linux system that automatically boots to an X login, but would rather have the system automatically boot to the console login. How should the system be configured to accommodate the user? A. By typing "init 3" in an xterm. B. By running the Xbootmgr utility. C. By editing /etc/lilo.conf and adding the line: boot = console D. By changing the line in /etc/inittab that reads: id :5:initdefault: to read: id:3:initdefault: Answer: D. Explanation: The inittab file specifies the default runlevel for the machine. Run level 5 will automatically boot to an X login. Runlevel 3 will boot to a console login. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 410, 399. Incorrect Answers: A. Init 3 will change the runlevel to runlevel 3, but the default boot runlevel won't be changed. B. Xbootmgr will not change the default runlevel of the machine. D. The is an incorrect use of the boot command in a lilo.conf file. Question: 191

Page 66 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A user complains that they can send and receive mail on the Internet, but cannot browse the Web. They have tried using different Web browsers in X. Working offline is disabled. What is most likely to be the problem? A. The user is not typing the Web address correctly. B. Web support was not added during the initial installation. C. X dropped Web access to the browser and needs to be restarted. D. There is a proxy sever that the browsers have not been configured to use. Answer: D. Explanation: If you have a proxy server configured on the network, the client computers need to be configured to use it to access the internet. Reference: http://www.squid-cache.org/ Incorrect Answers: A. An incorrect web address would return a page not found error or a different website. B. Web support is added by default in most installations. C. This is not something that X can do. Question: 192 A user-defined cronjob is configured incorrectly and is slowing down a server. What is the best way to address this issue? A. Use "cron-d*" to delete each user's cron jobs. B. Use "userdel <user>" to delete the user to prevent additional cron jobs. C. Use "crontab -u <user> -l" for each user to find out who has the incorrect crontab. D. Prevent cron from launching any additional processes by using "killall -9 crond". Answer: C. Explanation: You need to find out which users' cron job is causing the problem and stop the cron job. Reference: http://www.oreillynet.com/linux/cmd/c/crontab.html Incorrect Answers: A. It is not necessary to delete all the users' cron jobs. B. It is not necessary to delete any user accounts. D. Cron is already running a troublesome process. Killing any additional processes won't help. Question: 193 Which of the following tasks cannot be accomplished with the touch command? A. Create a new file. B. Change a file's modification time. C. Change a file's access time. D. Change a file's creation time. Answer: D.

Page 67 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: The touch command is used to display information about a file, including its modification and last access times. If the file doesn't exist, touch will create it. It cannot modify a file's creation time. Reference: http://www.oreillynet.com/linux/cmd/t/touch.html Incorrect Answers: A. If a file doesn't exist, touch can create it. B. You can change a files modification time with the touch command. C. You can modify a files access time with the touch command. Question: 194 A site administrator instructs the technician to install Linux as a secondary OS on an existing workstation. He wants to use the boot loader of the primary OS. When requested where to place LILO, the technician should select which location? A. BIOS B. /etc/disktab C. Master boot record D. Partition superblock Answer: B. Explanation: The default location for a Linux boot loader is in the Master Boot Record. However, if you want to use the boot loader of another operating system, you'll need to put the Linux boot loader into a directory in a Linux partition such as /etc/disktab. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 213. Incorrect Answers: A. You cannot put a Linux boot loader into the BIOS. C. If you want to use the boot loader of another operating system, you'll need to put the Linux boot loader into a directory in a Linux partition such as /etc/disktab. D. You cannot put a Linux boot loader into the partition superblock. Question: 195 A network administrator attempted to configure the Ethernet interface. He issued the insmod command along with the driver's object file. However, insmod reports errors about unresolved symbols. Which of the following is the cause of the problem? A. A driver of that type has already been installed. B. The latest version of insmod is not installed. C. The compiled driver is incompatible with the kernel. D. The module is designed for a device of another type. Answer: C. Explanation: Unresolved symbol errors are usually caused by attempting to install a module/driver which is incompatible with the kernel. Reference:
Page 68 of 217

SMB B. FIPS is a utility that can resize partitions without losing data. Smith. What is the best way to install Linux without removing the other operating system? A. It is not used with BootP. Explanation: BootP is an IP protocol. Fdisk creates partitions but it cannot resize them. Which protocol must be installed on the BOOTP server to communicate with the client terminal? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. D. but only uses 8 GB of the partition. Rsize is the incorrect command. IGRP C. C. B. Another operating system is currently installed. you need to reduce the size of the FAT32 partition to free up enough space to create a Linux partition. Incorrect Answers: B. Explanation: To install Linux. The module would still load if it were designed for another device. Format will erase everything on the partition. not resize it. It is not necessary to have the latest version on insmod installed. The device just wouldn't work. B. TCP/IP Answer: D. SMB is a NetBIOS protocol used for communication with Windows computers. commonly used with diskless workstations. Reference: Roderick W. D. Incorrect Answers: A. Smith. Question: 196 A computer has a FAT32 partition that takes up the entire 16 GB hard driver. It is not used with BootP. IGRP is a routing protocol. OSPF D. C. Sybex Linux + Study Guide: Page 571. Run fdisk D. Run FIPS B.html Incorrect Answers: A. Run rsize C.com/TERM/B/BOOTP. OSPF is a routing protocol. Reference: http://www. This would not cause an unresolved symbol error. Question: 197 A client terminal requires the BOOTP protocol in order to access the server. Sybex Linux + Study Guide: Page 43. Run format Answer: A. It is not used with BootP. Page 69 of 217 .webopedia.

It generates too much diagnostic output to read on the screen and does not write to a log file. Running the command in the background would not capture the output. Run the command in the background. D. /var/log/dmesg C.log B. This is not the default location for application error messages. Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 198 Where is the first place to look for error messages while installing and testing an application? A. Sybex Linux + Study Guide: Page 613. 1 C. /tmp/boot. C. /var/log/kernel/errors Answer: C. D. Making changes to the syslog. /var/log/messages D. Incorrect Answers: A.conf file won't help because the program doesn't write to a log file.conf C. Answer: D. Smith. Explanation: Most applications write messages to error logs stored within /var/log/messages. Smith. Explanation: By redirecting the output to a command line in a console. Reference: Roderick W. Running the command as a daemon would not capture the output. Reference: Roderick W. B. B. Question: 199 A new shell command is installed and does not perform correctly. Sybex Linux + Study Guide: Page 656. Make the changes to /etc/syslog. Which of the following would capture the output for evolution? A. B. 0 B. 2 D. 3 Answer: B Page 70 of 217 . This is not the default location for application error messages. you could read the output by scrolling up the window. Question: 200 Which runlevel only grants root access? A. Add redirection to the command line. Run the command as a daemon. This is not the default location for application error messages.

Smith. Inside Linux: Page 397. Answer: B. Runlevel 2 is a multiuser mode in which any user can log in. D. Smith. Page 71 of 217 . The UID and GID must match. Spaces are permitted between the first and last name. only the root user can log in to the system. Spaces are not permitted between the first and last name. In the mode. The UID is not valid. C. rpm -m <package name> D. rpm --remove <package name> Answer: A. rm -rf <package name> C. The User ID and Group ID do not have to be the same. Runlevel 2 is a multiuser mode in which any user can log in. Sybex Linux + Study Guide: Page 178. Reference: Roderick W. Explanation: The second field is the password field. B. C. Question: 202 What command is used to remove an rpm package from Linux? A. Sybex Linux + Study Guide: Page 410. This account has no password as indicated by the '*'. rpm -e <package name> B. D. The user ID is valid. D. Question: 201 A new employee having a problem with account login has the following enter in the /etc/passwd file: User1:*:51:501:John Doe:/home/user1:/bin/bash What is wrong with this entry in the /etc/passwd file? A. Explanation: The rpm -e <package name> command is used to remove an rpm package. Incorrect Answers: A. New Riders. (note: This is not the login name).Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Runlevel 1 is 'single user maintenance mode'. Incorrect Answers: A. This means that the account is locked. The account is locked. C. Runlevel 0 shuts down the computer. Reference: Roderick W. Tobler. Reference: Michael J.

org Which of the following best describes what the mail handler will do when user "audrey" receives mail? A. all of the following must be configured correctly EXCEPT A.org will forward a copy of the email to that address. New Riders. Explanation: The resolution capability is a graphics card setting. /audrey. There is no --remove option in the rpm program. It saves a copy of the mail locally and forwards a copy of the mail to audrey@comptia. RAMDAC B. Resolution capability Answer: D. Tobler. It forwards a copy to comptia. Reference: Michael J.org. Video RAM C. Sendmail. D. Incorrect Answers: Page 72 of 217 . this setting when incorrectly configured would not damage a monitor. C. C. Page 429.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: B. B. However. The Video RAM must be configured. The RAMDAC must be configured.org and does not keep a local copy.org. B. D. separated by commas. Inside Linux: Page 135. You would need to delete every file installed by the package if you were to use this command. Refresh rate D. Explanation: A . Reference: Bryan Costales. /Audrey will keep a copy in a directory called /Audrey.org.foward file is used to tell an email client what to do with received email. Answer: B. This is the command used to delete a directory. Incorrect Answers: A. O-Reilly Press.audrey@comptia. C. Question: 204 The following is an example of a ". It runs a program audrey that is found in the root directory and forwards the mail to audrey@comptia. Question: 203 In order to prevent monitor damage when configuring X. Audrey@comptia. It runs a program called audrey that is found in the root directory and forwards the program's results to comptia. You can have multiple entries in the file.forward" file found in user Audrey's home directory. There is no -m option in the rpm program. The refresh rate must be configured.

~/.d/inittab does not contain configuration information for the various runlevels. Reference: Roderick W.bash_login. LOADLIN. Disk Druid is a hard disk partitioning utility.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. not a Linux boot loader. It does not run a program called Audrey. /usr/local/etc/getty. not a Linux boot loader.bash_profile. Minix is an old UNIX operating system. in which of the following sequences are the scripts sourced? A .dlinit. Sybex Linux + Study Guide: Page 490. Grub and LOADLIN. Incorrect Answers: B. ~/. not a Linux boot loader.bash_login.bash_profile./etc/profile. Reference: Roderick W. /etc/profile. Sybex Linux + Study Guide: Page 400. Disk Druid D. ~/. It will save a copy in the /Audrey directory. Smith. ~/. ~/. ~/. It does not run a program called Audrey.conf does not contain configuration information for the various runlevels. Minix B.d/inittab D. C. Fips is a partition resizing utility.EXE Answer: D. Explanation: There are various boot loaders for Linux such as LILO. ~/.profile C . /usr/local/etc/getty. Question: 206 Which of the following programs can be reconfigured to boot Linux? A.bash_login. ~/.profile. LOADLIN. ~/. Question: 207 When BASH is invoked as an interactive login shell. /etc/termcap C.dlinit. /etc/termcap does not contain configuration information for the various runlevels.bash_profile.bash_profile Page 73 of 217 . C.~/.profile B .EXE is a DOS program that can load Linux.bash_login. D. D./etc/profile. Incorrect Answers: A. C. FIPS. /etc/rc. Explanation: The /etc/inittab file contains the default configuration information for the various runlevels. /etc/rc.~/.EXE C.EXE. B. /etc/profile D . ~/. /etc/inittab B. Question: 205 What file should be edited to add two additional gettys to runlevel 3? A.conf Answer: A. Smith.profile.

This is not the correct file to configure X.1. Which of the following files is used to configure X? A. Explanation: The first three octets of a Class C address are the network address.0. This is not the correct file to configure X.1.1. C. Question: 209 A new video card is added to a Linux workstation. The last octet is the host portion of the address.1. Question: 210 What command is used to remove a kernel module? A. It resides in the /etc/X11 directory. Reference: Roderick W. Broadcast: 192. The broadcast address has 255 as the host portion (255 = all 1s in binary).1. Network: 192. Incorrect Answers: A.0. This is not the correct file to configure X. /root/Xwindows/Xconf Answer: C.168.0. /etc/X11/XF86Config D. Broadcast: 192.1.0.1.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 208 A server has the following Class C IP address: 192.0 C. /uninstall <module name> Page 74 of 217 . This gives us 192. rm -rf <module name> D. B. B. rmmod B.0 D. 192.g. Network: 192. rm module C.0. The network address has a zero as the host portion (e.0.0). Broadcast: 192.168. Sybex Linux + Study Guide: Page 124.0. Network: 192. These are incorrect network and broadcast addresses. /etc/X11R6/Xconfig C. These are incorrect network and broadcast addresses. These are incorrect network and broadcast addresses.168.168.255 as the broadcast address. D. Smith. Incorrect Answers: A. Network: 192.1.168.2 What are the default network and broadcast addresses? A.1.2 B.1. Explanation: XF86Config is the configuration file for X.255 Answer: D. Broadcast: 192. /usr/conf/Xconfig B.0.168.168.168.

/usr/local/bin D.1 jsmith root 113 Jun 16 12:59 employees -rw-r---.Remove jsmith to the group salary C . This is a non-existent command. Explanation: The 'rmmod' (remove module) command is the correct command to remove a module.Add jsmith to the group root B . Question: 211 User jsmith needs read and write access to the file named employees but should have no access to the file named alary User jsmith is member of the groups smith and elso? -rw-rw---. Sybex Linux + Study Guide: Page 574. C.Remove jsmith from the group belso D . The command rm module would delete a file called module from the current directory. Reference: Roderick W. Question: 213 A new printer has been installed and the printcap file has been edited. Smith.Remove jsmith from the group jsmith Answer: C Question: 212 Which of the following contains system user default configuration files and directories? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A. C. Reference: Roderick W. Explanation: The default configuration files for user accounts are in /etc/skel. The default user configuration files are not stored in the /usr/config directory. D. Sybex Linux + Study Guide: Page 260.conf file. Smith. /etc/skel B.1 salary belso 4230 Jun 18 18:01 salary Which of the following should be done to accomplish the goal? A .conf Answer: A. These settings are copied when a user account is first created. Incorrect Answers: B. /etc/user. D. The default user configuration files are not stored in the /etc/user. The rm -rf command would delete all files in a directory called <module name>. Incorrect Answers: B. /usr/config C. The default user configuration files are not stored in the /usr/local/bin directory. Is the printer ready to use? Page 75 of 217 .

Sybex Linux + Study Guide: Page 339. No. D. C. Answer: D. Explanation: Page 76 of 217 . Reference: Roderick W. you need to restart the printer daemon to activate the changes. B. because there is also a spool daemon that will need to be restarted. D. Use nslookup. Use netstat. The printer is not ready for use without restarting the printer daemon. Incorrect Answers: B. Question: 214 Which of the following protocols is used while configuring a workstation to dial into and connect to a new ISP? A. Yes. Use ping. Explanation: PPP (point-to-point) protocol is the protocol used to connect to an ISP (Internet Service Provider). C. Contact the Internet Service Provider (ISP). Question: 215 An Internet Web server is being installed. because the printer configuration files are read every time the printer spool is used. Smith. because it is necessary to run the program called printcap which creates a separate file used by the printer daemon. SNMP Answer: A. C. The printer is not ready for use without restarting the printer daemon. UUCP D. Reference: Roderick W. D. D. because the printer daemon must be restarted. Answer: A. There isn't a separate spool daemon that needs to be restarted. C. SNMP is not used to connect to an ISP. No DHCP server is available. Yes. UUCP is not used to connect to an ISP. Smith.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Explanation: After making changes to the printcap file. UDP C. UDP is not used to connect to an ISP. Incorrect Answers: B. PPP B. B. Sybex Linux + Study Guide: Page 550. What is the proper method to obtain a valid Internet IP address? A. No.

Incorrect Answers: B. They use SCSI IDs to differentiate between devices. not to obtain an IP address. Sybex Linux + Study Guide: Page 438. and applications. The SCSI ID is set incorrectly. Reference: Roderick W. Sybex Linux + Study Guide: Page 346. B. the scanner cannot be correctly used by the software. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When installing an Internet Web server. C. Question: 217 A user has just connected a SCSI scanner device to his computer. Answer: D. Only the SCSI controller to which the SCSI devices connect uses an IRQ. Explanation: SCSI devices don't use IRQs. D. The scanner device is damaged. Answer: A. There is an IRQ conflict between the scanner and another device. Use a single distribution for the operating system. D. Reference: Roderick W. After installing the vendor's drivers. not to obtain an IP address. Smith. Apply the latest patches and updates to the operating system and applications. but documentation is more important. The last device is not terminated. Nslookup is used to test DNS. This will make it easier to troubleshoot any problems that may occur in the future. not to obtain an IP address. C. C. utilities. you'll need to contact the Internet Service Provider to find out what IP address to assign to the Web server. Question: 216 Which of the following tasks is the most important best practice when performing a new installation of Linux for a customer? A. Sybex Linux + Study Guide: Page 565. Smith. but this is not required and is not the most important 'best practice'. Using a single distribution is a good idea. Page 77 of 217 . Document all configuration settings used during the installation. Use default settings during the installation and make custom changes after the operating system is running and validated. Netstat is used to troubleshoot network connectivity. Using default settings may make the installation easier. Reference: Roderick W. it is good practice to document all configuration settings used during the installation. D. All of the following are possible reasons EXCEPT A. Incorrect Answers: A. Smith. Applying the latest patches is important. B. but documentation is more important. Explanation: When installing Linux for a customer. Ping is used to test IP connectivity. B.

Jabber may occur. Explanation: Extended Capabilities Ports support direct memory access (DMA).com/ecpmode. Power surges would not occur on a network cable. Bi-directional communication.fapo. Question: 218 What may happen if a network cable and a power cable are too close together? A. D. Crosstalk can occur when network cables are close together. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. C. It is not caused by a power cable. B. This magnetic field can interfere with data traveling along a network cable if the network cable is close to the power cable. Daisy chaining capability. Reference: http://www.htm Incorrect Answers: B. This is known as EMI (Electro Magnetic Interference). D. Crosstalk may occur. C. C. if it was close to a power cable. It is possible that the last SCSI device on the SCSI chain is not terminated. C. Answer: A. Daisy chaining is support by both types of parallel port. EMI may occur. D. This is not supported by Enhanced Parallel Ports. Direct memory access (DMA) capability.htm Incorrect Answers: A. Bi-directional communication is support by both types of parallel port. It is possible that the SCSI ID is not set correctly.kemcointernational. C. Omni-directional communication is support by both types of parallel port. not by a power cable. Question: 219 What is the advantage of using an extended capabilities port (ECP) over an enhanced parallel port (EPP)? A. B.com/newcoatings. Explanation: All power cables produce an electro magnetic field around them. B. Omni-directional communication. Reference: http://www. Power surges may occur on the network cable. Question: 220 Page 78 of 217 . Jabber can be caused by a faulty network card. Answer: D. It is possible that the scanner is damaged.

The BIOS does not appear to support ATA devices. Incorrect Answers: A. B. physically connected to the ATA controller and power supply. B. C. this is the most likely cause of the problem. Which of the following is the most likely problem? A. Explanation: ATA devices are usually auto-detected by the CMOS during system boot up. it is important to ground yourself to prevent static electricity shocks which can destroy PC components. Question: 222 Enabling Init13h support on a SCSI controller card enables use of which of the following devices? A. He verified that the devices were cabled properly. Hard drive Answer: D. Reference: Roderick W. A common way to do this is to wear a strap that fits to your wrist and connects to the metal case of the computer. It is not necessary to ensure that the humidity is below 5%. Incorrect Answers: A. ATA devices have not been set up with the configuration diskette. not the PC. C. Smith. However. Scanner B. Tape drive D. Printer C. D. Ensure that the humidity is below 5%. Sybex Linux + Study Guide: Page 31. B. Explanation: When working with components in a PC. You should ground yourself. You don't need to remove the CMOS battery to change the processor. Smith. All modern PCs can support at least four ATA devices. The CMOS setup is set to ignore all ATA devices. Answer: B. Properly ground himself. Properly ground the PC. Page 79 of 217 . Remove the CMOS battery. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A technician booted a PC and noted that none of the four ATA devices were detected. What should he do before beginning the work? A. D. Answer: C. this can be disabled. All modern BIOSs support ATA devices. ATA devices do not need to be set up with a configuration diskette. Sybex Linux + Study Guide: Page 563/4. Question: 221 A technician wants to replace a system processor. and jumpered correctly. As all the devices are correctly fitted. C. No PC can support four ATA devices. D. D.

Install the hard drive normally. Question: 225 Page 80 of 217 . Incorrect Answers: A. C. Answer: B. C. you need to ensure that Init13h support is enabled on the SCSI controller. Explanation: It is most likely that the SCSI bus is incorrectly terminated. Question: 223 How can an ATA-66 hard drive be utilized with an UDMA-33 controller? A. You don't need more than one device on a SCSI chain for proper SCSI operation. More than one device is required for proper SCSI operation. Reference: Roderick W. C. not a printer. The SCSI bus is not properly terminated. There is no 2 foot limit on a SCSI chain. External SCSI devices are not supported by Linux. It is possible that the bus was terminated at the device before the unrecognized device. Flash the BIOS. External SCSI devices are supported by Linux. Question: 224 A single SCSI device is not recognized during SCSI BIOS initialization. Which of the following has most likely caused this? A. B. D. It is not necessary to reconfigure the jumper settings on the motherboard. It is not necessary to flash the BIOS. C. B. Smith. D. Incorrect Answer: B. Explanation: An ATA-66 hard drive can run on a UDMA-33 controller.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: To use a SCSI hard disk. not a tape drive. Answer: A. Reconfigure the jumper settings on the motherboard. Smith. Init13h support enables the use of a SCSI hard disk. Init13h support enables the use of a SCSI hard disk. Sybex Linux + Study Guide: Page 579. Reference: Roderick W. Init13h support enables the use of a SCSI hard disk. B. Incorrect Answers: A. An ATA-66 controller must be installed. D. The cable is over the 2-foot limit for the type controller. D. not a scanner. C. It is not necessary to install a new controller. Sybex Linux + Study Guide: Page 30-31.

this speed is doubled. Defrag does not repair bad sectors and Scandisk is a Windows utility. not the MAC address. In full duplex mode.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 What is the Media Access Control (MAC) address of an Ethernet interface? A. C. The 48 bits signify the vendor of the card and the last 48 bits are unique for every card sold by the vendor. Incorrect Answers: A. 50 Mbps C. it will fail again if you try to reboot. B. C. Reference: Roderick W. An identifier used when forwarding packets between routers. D. Question: 226 After having worked for several months. 100 Mbps D. The MAC address is unrelated to IPSEC. Explanation: The best course of action would be to test the hard drive with the manufacturer's diagnostic utility to confirm that the hard disk has bad sectors. Explanation: Every network card has a 96 bit unique identifier 'burned' into the card. A hexadecimal number that makes a network interface card unique. C. C. Page 81 of 217 . Smith. The 32 bit address is the IP address. D. The MAC address is a hardware address. Replace the defective HDD and reload the system. Incorrect Answers: A. Run Scandisk and Defrag to repair the damaged sectors. Which is the first action to take? A. Explanation: The 100 in 100BaseTX stands for 100 Mbps. B. The 96 bit number is usually displayed as a hexadecimal number. D. Answer: D. The encryption key used for IPSEC. Question: 227 What is the maximum bandwidth of 100BaseTX in half-duplex mode? A. Sybex Linux + Study Guide: Page 327. A 32-bit address that is often associated with a logical name. 10 Mbps B. If the PC failed to boot to due a bad hard disk. Run the manufacturer's Diagnostic Utility. It may not be necessary to replace the hard drive. a PC fails to boot and indicates that the HDD has bad sectors. Routers use software addresses such a IP addresses. Reboot the system to remove the message. 200 Mbps Answer: C. B. Answer: B.

not 50. the system reports a configuration error. The CMOS battery tests good. The 100 in 100BaseTX stands for 100 Mbps. Answer: D.wikipedia. These are commonly used in laptops. the system reports the same configuration error. Explanation: The exhibit shows a PCMCIA card. D. The technician fixes the BIOS settings and the problem is solved. Network switch. B. This is not a network switch. Reference: Roderick W. Smith. After a cold reboot. The 100 in 100BaseTX stands for 100 Mbps. C. Stand-alone server. not 10. in which type of system would the device most commonly be used? A. This is not a stand-alone (or any other) server. C. B. This is not a network firewall. Question: 229 During boot.com/wiki/100baseTX Incorrect Answers: A. The 100 in 100BaseTX stands for 100 Mbps. Incorrect Answers: A. 200Mbps can be achieved in full duplex mode. Question: 228 Exhibit: Based on the exhibit. Sybex Linux + Study Guide: Page 589.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. B. D. Mobile workstation. What is the most likely problem? Page 82 of 217 . Network firewall.

a 1 interpreted as a 0 or a 0 taken to be a 1. Explanation: In digital electronic systems. When a bit is mistakenly interpreted. Smith. D. which suggest a bad system board (motherboard). The system memory (RAM) is unrelated to the BIOS or CMOS. B. EDO B. The fact that you received the same error after configuring the CMOS suggests that the BIOS was able to read the CMOS. ECC Parity in itself does not correct errors. deterioration due to age. Parity D. When binary information is passed from one point to another. Bad or missing command interpreter. Bad system memory. you are actually configuring the CMOS. ATX B. component failures. The BIOS reads the information in the CMOS during boot up. This can be caused by media defects. there is always some chance that a mistake can be made. Bad system board. D.com/mnecctek/faqs. the BIOS chip is functional. For high data rates. The CMOS is remembering the configuration settings and the battery is good. ECC C. poor connections. information is represented in binary format (1's and 0's). A bad command interpreter would cause problems when running programs. Explanation: When configuring the BIOS. electronic noise. C. RAMDAC is used with video adapters and does not perform error checking. Therefore. ATZ C. Answer: B. C.aol. Bad BIOS chip. Error correction is the process of detecting bit errors and correcting them and can be done in software or hardware.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. C. Sybex Linux + Study Guide: Page 12. Taken from ECC Tech http://members. Reference: Roderick W. error correction must be done in special-purpose hardware because software is too slow. but also corrects single-bit errors? A. Incorrect Answers: A. ATDT Page 83 of 217 . not startup problems. EDO RAM does not detect errors. D.html Incorrect Answers: A. RAMDAC Answer: B. Question: 230 Which type of memory not only detects. a bit error has occurred. Question: 231 What AT command is used to reset a modem? A. and other factors.

oreillynet. Sybex Linux + Study Guide: Page 565. The ATM0 command does not reset a modem. The ATDT command does not reset a modem.html Page 84 of 217 . Incorrect Answers: A. Explanation: The ATZ command is the correct command to reset a modem. 8 Answer: C. IRQ 8 is available for use by a device added to the system. Explanation: The usermod command is used to modify a user's settings. 6 D.1234 C. B. D. Reference: http://www. Question: 232 Which IRQ is used by most FDD controllers? A. The comment should be followed by the username of the account that you are modifying. Question: 233 What command would allow an administrator to add an existing user's phone number to the system as a comment? A. Reference: Roderick W. echo bsmith:x:502:502:555-1234:/home/chris:/bin/bash> /etc/passwd Answer: A. D. The ATX command does not reset a modem. 2 C.za/hayesat. usermod -c 555-1234 bsmith B. The -c option allows you to add a comment.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. IRQ 2 is not used by any system devices but is used to enable the use of extra IRQs. Smith. not the FDD controller. C.htm#Hayes%20AT%20Commands Incorrect Answers: A.co. Explanation: Floppy disk drive controllers commonly use IRQ 6.com/linux/cmd/u/usermod. Reference: http://www. ATM0 Answer: B. IRQ 0 is used by the system timer.option. modinfo -u bsmith 555. useradd -u bsmith -c 555-1234 D. 0 B.

and then use the adduser command to create the user accounts. As root. Incorrect Answers: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: B. As root. then adduser to create the user accounts. where is the compiled kernel typically located? A. B. /dev C. This includes the kernel. The group must be created before the user accounts. Echo is the wrong command to modify a user account. C. then edit the /etc/passwd file to change each users GID. Smith. D. Sybex Linux + Study Guide: Page 270. The kernel is not typically located in the /dev directory. edit the /etc/group file and include all the users to the 'users' group. Explanation: The best way to enable users to share files is to put the users into a shared group. Explanation: The /bin directory typically contains the binary files used by the system. B. As root. What method would be used to accomplish these goals? A. /root Answer: A. Reference: Roderick W. Question: 234 A group of users would like accounts created for them. Modinfo is the wrong command to modify a user account. C. C. The kernel is not typically located in the /boot directory. not the 'users' group. Useradd is the wrong command to modify a user account. They want to access a particular application on the server. run the adduser command to create the users' accounts. C. run the groupadd command to create the shared group. D. Sybex Linux + Study Guide: Page 169. Smith. The users that require access to the files should be placed into a separate group. Question: 236 Page 85 of 217 . run the adduser command to create the shared group. /bin B. Answer: D. D. The group requires sharing the files created using the application. Reference: Roderick W. You need to create a shared group before you can add the users to it. As root. Question: 235 On a Linux system. The kernel is not typically located in the /root directory. Incorrect Answers: A. /boot D. You need to run the groupadd command to create a group.

:q! C. unmount -a Answer: C. The unmount command unmounts a disk drive or remote share.html Incorrect Answers: A. rm-rf* D. Page 86 of 217 . Reference: http://www. df* B. Question: 238 A user has just completed an important document. D. umount /floppy B. you would use the :q! command. This command when run from the root prompt will effectively delete every file on the system. Question: 237 What command in vi quits without saving changes? A. :QQ D. This is not dangerous. :ZZ B. How should the user unmount the diskette that is mounted on /floppy to ensure that the data is saved on the disk? A. mount -u /floppy C. C.ac. This is not dangerous.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following is the most dangerous command to run as root at the root prompt? A. and wishes to save it to his diskette drive and remove the disk. unmount /dev/floppy. This is the incorrect command to exit Vi. Explanation: To exit Vi without saving your changes.uk/is/selfhelp/documentation/vi-r2/vi-r2. Explanation: The rm command is used to delete files or directory. Reference: http://www. This is the incorrect command to exit Vi. Esc-q Answer: B. Simply eject the disk and the system will unmount the disk. D. fsck C. This is not dangerous.com/linux/cmd/r/rm. B. The df command reports the amount of free disk space.htm Incorrect Answers: A. Answer: A. This is the incorrect command to exit Vi.oreillynet. The -rf options make the command recursive and forceful. The fsck command checks the file system for errors.bris. D. This means that the contents of any subdirectories will be deleted without giving any confirmation messages.

D. find C. Question: 239 Which of the following commands can be used to generate a list of all errors recorded during the month of March? A. Syslogd is used to generate TCP/IP error messages and write them to a file as specified in the syslog.conf file. New Riders. more D. If you eject the disk without unmounting it. To save the cached data to disk. although a minimum of 16 MB is recommended. C. not search the contents of files. Reference: Roderick W. Mount is the wrong command. syslogd Answer: A. Reference: Roderick W. For example. Explanation: The swap partition should ideally be twice the amount of physical RAM. Find is used to find files. Sybex Linux + Study Guide: Page 433. Tobler. C. /dev/floppy is the wrong mount point. Question: 240 The recommended minimum size of the swap partition is ______ MB? Answer: 16. Inside Linux: Page 13. you could return every line of text that contains the word 'March'. and display them one screen at a time. Reference: Michael J. Smith. you will lose the cached data. More is used to find files. Smith. you must use the umount command followed by the device name or mount point. grep B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Care should be taken when ejecting floppy disks because Linux caches access to them. Incorrect Answers: B. Question: 241 The maximum size of the swap partition is _____ MB? Answer: 128 (?) Page 87 of 217 . Sybex Linux + Study Guide: Page 469-470. D. The question states that the floppy is mounted as /floppy. Incorrect Answers: B. Explanation: Grep is a very useful tool for searching the contents of files based on various search criteria.

C. Page 88 of 217 . Reference: Roderick W. Incorrect Answers: B. What command should you use? A. Reference: Michael J. Sybex Linux + Study Guide: Page 43. fdisk sdb C.0/1685. B. Sybex Linux + Study Guide: Page 463. Tobler. fdisk hda2 Answer: B. C. Repartition the hard drive. Explanation: FIPS is a partition resizing tool.ussg. [Andrew Morton] (the linuxhacker) http://www. D. You can run Windows 95 and Linux on the same computer. You cannot run Windows 95 and Linux on the same computer. SCSI hard drives use sd not hd. Answer: A. SCSI hard drives use letters. Question: 243 You are partitioning your second SCSI hard drive. D. reinstall Windows 95. Create a directory under Windows 95 and install Linux in that directory. You cannot install Linux into a subdirectory in Windows 95. not numbers. How could you manage to install Linux on this computer with the least amount of effort? A. although Linux supports up to 16 swap partitions. SCSI hard drives use sd not hd. Smith.iu. Reference: Roderick W. It is not necessary to reinstall Windows 95. fdisk sda2 B. New Riders. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: The maximum size of a Linux swap partition is 128MB. the limit is 8 files of 2 gig for an maximum of 32 gig for the 2. Comment. Inside Linux: Page 17. However.6 kernel. thus freeing up enough space to create a Linux partition. fdisk hdb D. It can reduce the size of the Windows 95 partition without losing any data.edu/hypermail/linux/kernel/0306. there is no free space available.html Question: 242 You have a computer with Windows 95 installed and want to install Linux on it. Use fips to resize the partition containing the Windows 95. D. Smith. possible incorrect answer: in the kernel archive.4 and 2. Explanation: SCSI hard drives use the sd<letter> notation with the first drive being letter a (sda) and the second drive being letter b (sdb). Incorrect Answers: A.

Smith. C. Create an extended partition to be used for the data. Swap is not a partition type code. C. Incorrect Answers: A. Reference: Roderick W. p Answer: D. D. a D. Explanation: Page 89 of 217 . C. not display the partition table. 0x83 C. Smith. m C. 0x83 is the type code for a file system partition. not display the partition table. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 244 While using fdisk what command would you use to see the partition table? A. Incorrect Answers: B. Format the hard drive to use the ext2 filesystem. w B. D. Create a swap partition of type 82. s D. not the partition table. The m option is used to display the main menu. Explanation: Swap partitions use the type code 0x82. swap Answer: A. B. Answer: D. The w option is used to write the changes. S is not a partition type code. Question: 246 You have a new. Question: 245 What type would you set on a partition to make it a swap partition? A. What is the first step you use? A. B. Create a primary partition using fdisk. Sybex Linux + Study Guide: Page 541. Sybex Linux + Study Guide: Page 457. empty hard drive that you will use for Linux. 0x82 B. The a option is used to toggle a bootable flag on a partition. Explanation: The p option used with fdisk is used to display the partition table.

megabytes or gigabytes). What is the problem? A. Smith. not an extended partition. You can format the primary partition but when you try to format the extended partition it fails. B. kilobytes. a swap partition and an extended partition. D. D. Your syntax is wrong for the format command when attempting to format the extended partition. For this reason. Reference: Roderick W. B. You have to use the fdformat command to format extended partitions. so the syntax is likely to be correct. What command would you use to create the ext2 filesystem? Answer: mkfs.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 The first step to installing Linux on a new hard disk is to create a primary partition. Smith. Incorrect Answers: A. C. you are prompted to enter the starting and ending cylinders (although you can specify a size in bytes. You cannot format an extended partition. Smith. Linux needs a primary partition to boot from. Question: 248 When you create a new partition. B. C. Reference: Roderick W. (This can also be done as part of the installation process). Question: 249 In order to apply a filesystem to your new partitions you must format them. Page 90 of 217 . Explanation: When creating a new partition. not a swap partition. Explanation: The purpose of an extended partition is to house logical partitions. You don't need to create two primary partitions. Reference: Roderick W. Sybex Linux + Study Guide: Page 458. Incorrect Answers: A. There is no special command to format extended partitions. you cannot format an extended partition (you must create a logical partition first). Linux needs a primary partition to boot from. Sybex Linux + Study Guide: Page 457. You successfully formatted the primary partition. you need to designate its size by defining the starting and ending __________Answer: cylinders. Sybex Linux + Study Guide: Page 459. Question: 247 You have created a primary partition. You should have created another primary partition instead of an extended partition. You need to create a partition before you can format it. Answer: C.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: The command used to format a partition (which creates a file system) is mkfs (make file system). Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 459. Question: 250 When formatting your partition with the mkfs command, you can also pass to the command the type of filesystem and the number of _______? Answer: blocks. Explanation: When formatting a partition with the mkfs command, you can specify the number of blocks although this isn't necessary because mkfs can calculate this based on the size of the partition. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 459. Question: 251 You have new documentation that you wish to install so that it will be available to your users. Which directory would be the most appropriate to use for these files? A. /tmp B. /usr C. /lib D. /mnt Answer: B. Explanation: Most documentation including man pages is kept in the /usr directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 469. Incorrect Answers: A. /tmp is not the usual location for documentation. C. /lib is not the usual location for documentation. D. /mnt is not the usual location for documentation. Question: 252 Each inode contains extensive information on a file. Which of the following is not contained in the inode? A. File size. B. Filename. C. File's owner. D. Number of links to the file. Answer: B. Explanation: An inode contains the type (for example, plain file, directory, symbolic link, or device file) of the file; its owner, group, and public access permissions; the owner and group ID numbers; its size in
Page 91 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

bytes; the number of links (directory references) to the file; and the times of last access and last modification to the file. However, an inode does not contain the name of the file. Reference: http://perl.plover.com/yak/ext2fs/slide019.html Incorrect Answers: A. An inode does contain the file size. C. An inode does contain the file's owner. D. An inode does contain the number of links to a file. Question: 253 When you issue the command ls -1, the first character of the resulting display represents the file's _________Answer: type. Explanation: The first character displayed in the output of the ls -l command represents the file's type. For example, d represents a directory. Reference: http://www.firstlinux.com/articles/cards/permissions.shtml Question: 254 In order to run fsck on the root partition, the root partition must be mounted as _________. Answer: read only. Explanation: Fsck must only be run on unmounted or read only partitions. This is because any changes to the file system during normal read/write operations can confuse fsck and cause file system corruption. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 462. Question: 255 You cannot mount /dev/hdb1 and suspect that the superblock is bad. How do you fix this? A. Use the mkfs command. B. Use the fsck command with the -f option. C. Use the e2fsck to replace the superblock with a copy saved to another location on your disk. D. Restore the superblock from your tape backup. Answer: C. Explanation: The e2fsck utility can be used to replace the superblock with a copy saved to another location on the disk. Reference: http://www.mandrakeuser.org/docs/admin/arecov3.html Incorrect Answers:
Page 92 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A. The mkfs command will format the disk causing data loss. B. Fsck cannot be used to restore the superblock. D. You cannot restore the superblock from a tape backup because you cannot mount the drive. Question: 256 Why should you track the amount of free space on your disk? A. If there is no free space, you will not be able to write to that filesystem. B. If there is no free space, you will not be able to install new applications. C. If the amount of free space becomes less then 50 percent, then your system will slow down. D. If the amount of free space is too low, you system will not boot. Answer: A. Explanation: If there is no free space on a disk, you will not be able to write to that disk. Incorrect Answers: B. You will not be able to install new applications, but that is less of a problem than not being able to write to the disk. C. Disk space of less than 50% will not slow the system down. D. Low disk space will not prevent the system booting. Question: 257 You want to know how much space is being occupied by your user's home directories. Which of the following will provide you with this information? A. du -l /home B. du -b /home C. du -m /home D. du -c /home Answer: D. Explanation: The du (disk usage) command with the -c option will display the total used space in the specified directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 477. Incorrect Answers: A. The -l option is used to count the size of all files, whether or not they have already appeared (i.e., via a hard link). B. The -b option is used to display the size in bytes of all the files in the specified directory. C. The -m option is used to display the size in megabytes of all the files in the specified directory. Question: 258 You also need to know the amount of free space on the partition containing the user's home directories. Which of the following commands will provide this information? A. df /home B. df -i /home C. df --sync
Page 93 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

D. df -T Answer: A. Explanation: The df (disk free) command is used to display the free space in the specified partition or directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 471. Incorrect Answers: B. The -i option is used to display information about the inodes, not the free space. C. You need to specify the /home directory. Also, the -sync option is incorrect. D. You need to specify the /home directory. Also, the -T option is incorrect. Question: 259 You notice that the amount of free space is getting low. When you check the contents of the /tmp directory, you find several hundred files so you delete them. After deleting these temp files, you check the amount of free space, however, it has not increased. What should you do? A. Move the /tmp directory to another partition. B. Delete the partition containing the /tmp directory, recreate it and restore its contents. C. Delete the /tmp directory and recreate it. D. Run fsck on the filesystem containing the /tmp directory. Answer: C. Explanation: The easiest way to fix this is to delete and recreate the /tmp directory (it's easy because the directory is empty). Incorrect Answers: A. It is not necessary to move the /tmp directory to another partition. B. There are no contents to restore as they have been deleted. D. Fsck is time consuming and hence unnecessary. Question: 260 You have the /var directory on its own partition. You have run out of space. What should you do? A. Reconfigure your system to not write to the log files. B. Use fips to enlarge the partition. C. Delete all the log files. D. Delete the partition and recreate it with a larger size. Answer: B. Explanation: FIPS is a partition resizing tool. It can reduce or enlarge a partition without losing data. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 43. Incorrect Answers: A. You should not prevent the system writing log files. C. You should not delete all the log files. D. It is unnecessary to delete the partition, which would require restoring the data.

Page 94 of 217

messages file. Smith. Sybex Linux + Study Guide: Page 213/4. it writes any messages to the _______ file. Explanation: The dmesg utility displays all the boot messages that were displayed during system boot up. Reference: Roderick W. dmesg B. Smith. The boot messages are not stored in the kernel. Which of the following is not one of these? A. From a floppy disk. Type linux from a DOS prompt under Windows 95. Incorrect Answers: B. Sybex Linux + Study Guide: Page 615. B. C. Explanation: 'Linux' is not a DOS command and so cannot be used to start Linux. Incorrect Answers: B.messages. Answer: /var/log/boot. it writes any messages to the /var/log/boot. You can boot Linux using a boot loader such as LILO.messages file. Question: 263 What command can you use to see the boot messages? A. D. Question: 262 When the kernel is loading. Question: 264 Page 95 of 217 . C. Man logs would display the man files for a program named logs. You can boot Linux with a Linux boot floppy disk. Type linux at the boot: prompt. Explanation: When the kernel is loading. Smith. logview D. Using a boot loader such as LILO. man logs Answer: A. D.messages C. You can boot Linux by typing Linux at the Linux boot prompt.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 261 You can start Linux in many different ways. D. Reference: Roderick W. cat kernel. Answer: A. Logview is the incorrect command to view the boot messages. Sybex Linux + Study Guide: Page 615. C. Reference: Roderick W.

D. Sybex Linux + Study Guide: Page 393. Incorrect Answers: A. Incorrect Answers: A. Reference: Roderick W. This file contains the defined runlevels on a Linux system. D. What is the purpose of this field? A. The process field specifies the command to execute. C. B. Sybex Linux + Study Guide: Page 399. because it is responsible for starting all the other services (processes). Explanation: The inittab file is the configuration file for the init daemon.conf C. Sys. Answer: C. Question: 265 Each entry in the /etc/inittab file contains four fields the third of which is the Action field. B. The runlevel field defines which runlevels this line applies to Question: 266 Which file should you examine to determine the defined runlevels for your system? Answer: /etc/inittab Explanation: The inittab file is the configuration file for the init daemon. Specifies the command to execute. syslog Answer: C.conf is not a daemon. Page 96 of 217 . sys.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 After the kernel is loaded. Defines which runlevels this line applies to. Smith. The format of each entry in the inittab file is ID: runlevel: action: process. D. Syslog is not a daemon. inittab B. Reference: Roderick W. it calls the ______ daemon which is responsible for creating new processes. Identifies the entry. The purpose of the action field is to tell the init daemon what to do with each process. B. Defines how to handle the entry. Smith. A. The ID field identifies the entry. Inittab is the configuration file for the init daemon. init D. Explanation: The init daemon (initd) is sometimes known as a "super server".

sys. Answer: C. /etc/scripts C. Sybex Linux + Study Guide: Page 399.d B. /etc/inittab D.com/docs/manuals/linux/RHL-7. Reference: http://www. In this mode.init [runlevel] Answer: A. Explanation: The correct command to change the runlevel of a Linux system is 'init [runlevel]'. halt [runlevel] C. D. Explanation: Single user mode (sometimes known as single user maintenance mode or runlevel 1) is used to carry out maintenance to a system. D. Halt is the incorrect command. C. Question: 269 Where are the startup scripts defined? A.3-Manual/custom-guide/s1-rescuemodebooting-single. Not all processes are stopped and the file system is not mounted in read only mode. C. All processes are stopped and the root filesystem is mounted as read-only when in single user mode.html Incorrect Answers: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W.html Incorrect Answers: A. B.com/linux/cmd/i/init. It is a configuration file for the init daemon.init is not a command.redhat.oreillynet. init [runlevel] B. Question: 268 What should you type to change the runlevel of your system? A. Reference: http://www. /etc/start Page 97 of 217 . Init does not read the /etc/inittab file. Network services are disabled. Users can only log into the system across the network. sys. D. /etc/inittab is not a command. Users cannot log in to the system. B. /etc/init. Init does read the inittab file. only root can log in. Question: 267 How does single user mode differ from other runlevels? A. network services are disabled and only the root user can log in. Smith.

d folder according to the configuration in the inittab file.mod B. There is a script to load modules. Incorrect Answers: B. Smith. /etc/conf. Answer: A. C. Backup user's directories. This is the incorrect folder. Explanation: When a system starts up. What file do you use to pass parameters to a module? A. This is the incorrect folder. Explanation: The init daemon runs the rc startup scripts to start various processes when the system boots. Load modules. Sybex Linux + Study Guide: Page 402. C. Explanation: The /etc/conf. D. Sybex Linux + Study Guide: Page 411-412. Reference: Roderick W. Reference: Roderick W. Question: 271 Modules are pieces of kernel code that you can load or unload. Reference: Roderick W. D.modules file is used to associate a module (driver) with hardware device. B. Question: 270 Which of the following tasks is not controlled by one of the rc startup scripts? A. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. /etc/conf. There is a script to mount the file system. Inittab is the configuration file for the init daemon. Incorrect Answers: B. /etc/inittab Answer: A. Page 98 of 217 . Smith. /etc/modules C. /etc/inittab D. Sybex Linux + Study Guide: Page 394. D.modules Answer: D. Run fsck. Mount files ystem. the init daemon starts the scripts defined in the /etc/init. Smith. Backing up user directories is not controlled by one of these scripts. There is a script to run fsck.

Reference: http://www. The /etc/inittab file.ups file. C. Source is the incorrect command. Explanation: The init q command is used to instruct the init daemon to reread the /etc/inittab file and carry out the instructions in the file. C.oreillynet. /etc/power.html Incorrect Answers: A. not the /etc/ups. C. How do you institute these configuration changes without having to reboot your computer or have your users log off? A. Answer: C. Which file should you use to define the steps to be taken in the case of a power failure? A. Issue the command source /etc/inittab. This file should be edited to instruct the system to run the powerd daemon in the event of a power failure. Issue the init q command. /etc/conf. Explanation: The init daemon is responsible for starting processes. The /etc/inittab file. B. Page 99 of 217 . not the /etc/power.conf D.ups Answer: B. It is not necessary to change the runlevel. Reference: Roderick W. The init daemon can be instructed to read its configuration file at any time. The configuration file for the init daemon is /etc/inittab. /etc/inittab C. Question: 273 You have made changes to the /etc/inittab after installing your UPS. is used to configure the init daemon which is used start the powerd daemon.com/linux/cmd/i/init. Change the runlevel to single user mode. Sybex Linux + Study Guide: Page 399.mod is not the name of the module configuration file. Question: 272 You have installed a new UPS (Uninterruptible Power Supply) and the powerd daemon. not the /etc/conf. Smith. B. /etc/modules is not the name of the module configuration file. D. D. Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. is used to configure the init daemon which is used start the powerd daemon. is used to configure the init daemon which is used start the powerd daemon. The /etc/inittab file is used by the init daemon. The /etc/inittab file.conf file. B.conf file. /etc/ups. /etc/conf. The init daemon only reads its configurations file during boot. D.conf B.

LILO can be used on a floppy disk to install Linux. LILO will work with other operating systems such as DOS and Windows. LILO -s filename D. Question: 276 You have made changes to the LILO configuration file but you are not sure the changes will work. D. B. C. you can use the tab key to toggle between the various boot images on the system. C. It can be used on a floppy to boot Linux. Answer: C. press the Tab key. How can you test the new configuration without installing it? A. Explanation: At the LILO boot prompt. you cannot remember what you named them and you do not want to boot your default image. D. You have to boot your default image and then look at the configuration file. but this isn't a requirement. Reference: Michael J. It must replace the master boot record on your hard drive. New Riders. LILO can be used to specify up to 16 different boot images. LILO -c filename C. You can choose any installed boot image.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 274 Which of the following statements is not true about LILO? A. D. Incorrect Answers: A. not the Alt key. LILO Page 100 of 217 . Reference: Roderick W. Smith. It will work with other operating systems such as DOS and Windows. B. Explanation: The default location for the Linux boot loader is in the Master Boot Record (MBR). Tobler. It can specify up to 16 different boot images. Sybex Linux + Study Guide: Page 213. press the Alt key. Inside Linux: Page 374. LILO -t B. B. It can be located elsewhere. Question: 275 You boot your system using LILO. What should you do? A. Hold the shift key down when booting until you get a prompt. At the boot: prompt. You need to press the tab key. Incorrect Answers: A. D. At the boot: prompt. Although you have four different boot images on your system. you don't have to boot the default image. C. You don't need to hold the shift key down whilst booting. Answer: B.

cs. Incorrect Answers: B.0. The LILO command without any options will install LILO without testing the configuration file. Reference: http://www-ugrad.conf file. Question: 278 Part of your /etc/lilo.0. What changes should you make to the /etc/lilo.colorado. not the -s option. Answer: A. D.edu/udp/admin/linux-howto. Sybex Linux + Study Guide: Page 216. you need to add a line containing the word prompt to the lilo.conf. Add a line containing a timeout. D.conf file is as follows: boot=/dev/hda map=/boot/map install=/boot/boot.conf file to make a prompt appear every time you boot your system? A. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A. Smith. There is no timeout option for the lilo. C. Sybex Linux + Study Guide: Page 216/7.html Incorrect Answers: B.conf file. Page 101 of 217 . Add a line containing prompt. You must then run the LILO command to activate the changes. You need the -t option to test the configuration. B.b image=/boot/vmlinuz-2. Change the label to boot: instead of linux.36. Smith. You need the -t option to test the configuration. Add a line containing prompt=30. C. C. Explanation: To configure LILO to display a boot prompt. Reference: Roderick W. not prompt=30. not the -c option.conf). The line should contain just prompt.conf Explanation: The LILO configuration file is /etc/lilo. Explanation: The -t option used with LILO is used to test the LILO configuration file (/etc/lilo.7 label=linux root=dev/dha1 You would like to start in a single user mode but you do not get a boot: prompt. Question: 277 What is the complete name of the default configuration file for LILO? Answer: /etc/lilo.

conf file. D. B. Sybex Linux + Study Guide: Page 634. C. you would see the word LI during boot up. D. B. C. B. You need to run the lilo command without any options to activate the changes. Answer: D. Reference: Roderick W. C. If LILO wasn't installed properly. Install the configuration changes by issuing the command /sbin/lilo -t.when booting the system. The label is just the displayed name of the operating system.and then nothing happens. LILO loaded successfully but the kernel is corrupt. you wouldn't see any part of the work LILO during boot up. LILO could only complete the first stage. shutdown -t now Page 102 of 217 . shutdown -r now D.conf to cause a boot: prompt to show. usually a geometry mismatch. You must not rename the configuration file. Question: 279 You have changed /etc/lilo. Reference: Roderick W. D. Which of the following commands will halt your system so you can install the new hardware? A. you would see the word LILO during boot up. shutdown -k now B. What could be the problem? A. Install the configuration changes by issuing the command /sbin/lilo -u.new. Install the configuration changes by issuing the command /sbin/lilo. Question: 281 You are going to install a new hard disk in your system. LILO could not load the map file. however. usually media failure. it means that LILO could not load the map file. C. The -t option will test the configuration but not activate the changes. LILO is not installed properly. Explanation: After making changes to the lilo. Incorrect Answers: A. Smith. shutdown -h now C. Question: 280 When booting your system after installing LILO you see LIL. Explanation: If you only see LIL. Answer: B. If LILO could only complete the first stage. What should you do? A. you must run the lilo command to activate the changes. Rename your configuration file to /etc/lilo.conf. when you restart your computer you still do not have a prompt. If LILO loaded successfully. Sybex Linux + Study Guide: Page 218. Smith.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Incorrect Answers: A.

halt C. Answer: C.allow file can shutdown the system. Sybex Linux + Study Guide: Page 420/1. Explanation: The shutdown -h command will shut down your system properly. you can enter a message that will be displayed to users before the system shuts down. You cannot do this.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B. C. Reference: Roderick W. Smith. How can you accomplish this? A. Question: 282 You have a technician who will come in after hours to install new hardware in your system. You do not want to give him the root password. Reference: Roderick W. reboot D. The -h option issues the halt command as part of the shutdown process. Add his username to the /etc/shutdown. D. Shutdown. B.allow file.allow file contains the names of the user accounts that are permitted to shutdown the system. Smith. Which of the following commands will send a message to the users? A. The -k option would display a warning message. shutdown Answer: D. but would not actually shut down the system.conf is the wrong file. The -t option is used to delay the shutdown. init B. Sybex Linux + Study Guide: Page 420/1. Sybex Linux + Study Guide: Page 420/1. but he needs to be able to shutdown the system. Incorrect Answers: A. B. Give him the root password and change it when you arrive the next morning. Question: 283 You are going to reboot your system but want to warn your users to log off. Page 103 of 217 . Reference: Roderick W. It is not necessary or desirable to give the technician the root password. Explanation: When using the shutdown command. Incorrect Answers: A. Any user listed in the shutdown. Add his username to the /etc/shutdown. Smith. D. Explanation: The /etc/shutdown. only root can run the shutdown command. D. The -r option would cause the system to restart. C.conf file.

but you would have to come out of the man program to use it. The halt command does not send a message to users. D. the find command cannot search for text. B. Sybex Linux + Study Guide: Page 364. If the directory was searched later. The installation of man pages on your system is corrupt. find manpath C. however. The init command does not send a message to users. The correct command would be man hosts. D. What would you type while displaying the page to find the location where manpath is discussed? A. Answer: C. If the installation of the man pages is corrupt. /manpath D. It is used for locating files. If a page didn't exist. Question: 284 You want to review the man page on the files used to control host access. B. C. locate manpath Answer: C. C. You could use the locate command. Question: 286 Page 104 of 217 . D. You could use the grep command. The files used to control host access is hosts. Incorrect Answers: A.allow.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. What is the problem? A.allow. Reference: Roderick W. Explanation: You typed the command incorrectly. The page you are looking for does not exist on your system. but you would have to come out of the man program to use it. grep manpath B. you would still get the correct page eventually. not hosts_access. You typed the name of the page incorrectly. The reboot command does not send a message to users. Explanation: To search for text within a man page. you would get an error saying so. Incorrect Answers: A. You wouldn't get a different page. B. Find is not a man program command. Smith. you would use the / command followed by the word you were looking for. when you enter man hosts_access you get the man page for routines used to programmatically manipulate access. Question: 285 You want to find how to set the manpath variable so you type man man. B. you wouldn't receive any man pages. The page you are looking for resides in a directory that is searched later. Furthermore.

profile file.config file located in that user's home directory. man info B. Instruct the user in how to reset the MANPATH variable whenever he logs in. info help Page 105 of 217 . What should you do to accomplish this? A. -C is the wrong option to search the man pages for a specified string. D. Which command will find the appropriate page? A. You type man password but you get the message that no manual entry for password exists. B.oreillynet. How can you access a tutorial on using info? A. Question: 287 You have installed an additional set of man pages but in Spanish. Reference: http://www. Question: 288 You know that the info utility provides easier to understand documentation but you have never used it. info C. man -C password B. C. B. Edit the man. Answer: C. -c is the wrong option to search the man pages for a specified string. info info D. Edit the . D. -q is the wrong option to search the man pages for a specified string. You only need to set it once in the .profile file located in that user's home directory. It is unnecessary to reset the manpath variable every time the user logs in. Explanation: The manpath variable can be set in the .config file. D.html Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 You wish to find the man page that discusses how to change a password.edu/depts/accc/hardware/borg/profile. man -q password Answer: B. You need to edit the .com/linux/cmd/a/apropos. You have one user who wishes to use the Spanish pages rather then English ones. man -k password C. You would need to edit this variable to point to the Spanish man pages. C. Explanation: The man -k command is used to search the man pages for a specified string.html Incorrect Answers: A. You can only have one version of man pages installed on your system at a time.uic. not the man.profile file. You can have multiple versions of man pages installed on a system. man -c password D. Reference: http://www.profile file and is used to instruct the man program where to look for the man pages.

/usr/doc/HOWTO C. /usr/MyApp Page 106 of 217 . C. The HOWTO documents are not located in the /etc/HOWTO directory. Incorrect Answers: A. Note: /usr/share/doc/HOWTO deserves attention. Sybex Linux + Study Guide: Page 657. Question: 290 What does FAQ stand for? Answer: frequently asked questions Explanation: Frequently asked questions are often referred to as FAQs. Tobler. Man info would display the man pages for the info program. /usr/lib/HOWTO Answer: B. but not display a tutorial about it. Info help would display documentation on the help command. Explanation: The default location for the HOWTO documents is /usr/doc/HOWTO. Reference: Roderick W. D. Smith. Reference: Roderick W. D. These documents are normally installed in which directory? A. Question: 291 When you install a new application. /usr/HOWTO D. New Riders. Question: 289 There is considerable documentation covering various tasks provided as HOWTOs. Explanation: Info pages are easier to understand than the sometimes complex man pages. Incorrect Answers: A. B. documentation on that application is also installed. The HOWTO documents are not located in the /usr/lib/HOWTO directory.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. The info command would run the info program. The HOWTO documents are not located in the /usr/HOWTO directory. Smith. Info info is used to access a tutorial on the info program. Where would you look for the documentation after installing an application called MyApp? A. Inside Linux: Page 8. /etc/HOWTO B. Reference: Michael J. Sybex Linux + Study Guide: Page 657. The info info command is used to access a tutorial on the info program.

com C.deja. C. Explanation: The default location for application documentation is in the /usr/doc/<application name> directory. Page 107 of 217 .deja. Application documentation is not located in the same directory where the application is installed. You don't need to order a CD. /usr/doc/MyApp D. Linux Documentation Project.org/ Incorrect Answers: A. Your local Linux User Group should have a copy. http://www. D. Reference: Roderick W. Linux Mall and order a new CD. You have checked the HOWTOs and FAQs but have not found your answer. Answer: D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. In the same directory where the application is installed. B. Explanation: www. They can be found at www. C.com Answer: A.com B.lug.linux-help. Application documentation is located in the doc subdirectory of the /usr directory. Reference: http://www. http://www. The website for your distribution will have HOWTOs relating to your distribution but not all the applications that you may have installed. Question: 293 You have a problem installing an older CD-ROM drive on one of your Linux servers. Sybex Linux + Study Guide: Page 657. D.tldp. Your local Linux User Group may have a copy . B. Incorrect Answers: A. Question: 292 You need to update your HOWTOs.com is the Google search engine specifically designed to search for news groups.org. http://www. Where could you go to search the newsgroups to look for a solution? A. The web site for your distribution. Smith. Where should you go to acquire the latest version? A.news. The HOWTOs can be downloaded from the Linux Documentation Project website.tldp. http://www. Answer: C. Explanation: The Linux Documentation Project has all the latest HOWTOs. /lib/doc/MyApp C.com D. Application documentation is not located in the /lib/doc directory.or they may not. B.

html Question: 296 You locate a command in the /bin directory but do not know what it does. D. Reference: http://www.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. You wouldn't use the whereis command to look for source files. Since it searched the entire directory tree. You would not search for news groups at this site. You have to update the whereis database in order to keep it current. You would not search for news groups at this site.com/linux/cmd/w/which. Incorrect Answers: A. Question: 295 You suspect that you have two commands with the same name as the command is not producing the expected results. the whereis command can take an excessive amount of time. Answer: whatis.deja.oreillynet. The whereis command does not search the entire directory tree. There is no whereis database to update. C. Reference: Roderick W. C. Explanation: Page 108 of 217 . Smith. B. What command can you use to determine its purpose. B. The whereis command only searches known directories that are hard coded into the command. D. What is the disadvantage of using it? A. library directories and man page directories. What command would you use to determine the location of the command being run? Answer: which. Explanation: The which command is used to display the full path to the program that would be run if a specified command was issued. The whereis command will not find source files located on your system. Question: 294 The whereis command is helpful in finding the location of a command as well as its related man page. Explanation: The whereis command searches for files in a restricted set of directories such as standard binary file directories.com Incorrect Answers: B. Sybex Linux + Study Guide: Page 652. You would not search for news groups at this site. Answer: D. C.

It is the same as the man -k command. Updatedb is the wrong command to update the whatis database. It is the same as the man -f command. Question: 298 What does the apropos command do? A. Make whatisdb is the wrong command to update the whatis database. make whatisdb D. Whatis only searches for a single word. not the locatedb database. It uses the locatedb database to answer your query. Explanation: The makewhatis command is used to update the whatis database. makewhatis B. Reference: http://www. updatedb C.eu.html Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 The whatis command searches a database of short man pages to determine the purpose of a command. B. Question: 299 Which of the following items would not be important for you to record in your system documentation? A. Explanation: The apropos command is similar to the whatis command in that is searches the short descriptions from the man pages for a specified string. The database is not updated automatically.oreillynet. D. The database is updated automatically. Reference: http://www. B. Reference: http://www. D. Applications that are installed. Any kernel patches you might apply. C. Page 109 of 217 . Answer: A. It uses the whatis database. It is the same as the man -K command.com/linux/cmd/a/apropos.com/linux/cmd/w/whatis.org/cgi-bin/man-cgi?makewhatis+8 Incorrect Answers: B. It searches the short descriptions from the man pages. not the man -K command (note the capital K).html Question: 297 What command must you run to update the database used by the whatis command? A. Answer: C. D. C.tac.oreillynet. B. It is not the same as the man -f command.

Explanation: Documentation is an important part of any system administrator's job. Reference: Roderick W. Incorrect Answers: A. the last time each user logged on is not important and does not need to be documented. Smith. What problems with the system you have had.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. C. You wouldn't leave after every problem you fixed. When did each user log on last? D. Incorrect Answers: B. Explanation: When the cd command is used without specifying a directory. Sybex Linux + Study Guide: Page 438. Page 110 of 217 . fix it and leave. Question: 300 Which of the following would improve your ability to provide user support? A. cd B. Answer: C. Answer: A. cd home C. cd home/username Answer: A. B. Any installed applications should be documented. Email your user's your office hours. D. Using as much technical language as possible when explaining what went wrong would confuse the user and would gain nothing. Any kernel patches should be documented. Whenever a user has a problem. D. Create a directory containing instructions for using all installed applications. D. Sybex Linux + Study Guide: Page 438. However. B. cd. D. Question: 301 Which of the following commands will make your home directory your working directory? A. Smith. but this is not as helpful as application documentation. Use as much technical language as possible when explaining what went wrong. C.. Explanation: A directory containing instructions for using all installed applications would make a system administrator's job much easier. Reference: Roderick W. you will by default be taken to your home directory. It would be helpful for your users to know your working hours. Any system problems should be documented.

The -c option is used to list files by status change time. Question: 302 Which of the following commands will show a list of the files in your home directory including hidden files and the contents of all subdirectories? A. The cd. Page 111 of 217 ..html Question: 304 You have three files in the /home/ben/memos directory called letters. Explanation: The a option used with the ls command is used to display hidden files. The cd home/username command would not take you to your home directory. How could you determine each file's type by issuing only one command? Answer: file letters tom betty Explanation: The file command is used to display a files type. The -A option does not search the '. Cd home would take you to a subdirectory of your current directory named home. Incorrect Answers: B.' directory. Inside Linux: Page 55. It does not display hidden files and it does not search subdirectories.oreillynet. The R option makes the search recursive meaning that any subdirectories will be searched. tom.mem will be displayed.com/linux/cmd/l/ls. Tobler. Reference: http://www. and betty. D. ls -aR /home/username C. Answer: ls -r /home/ben/memos/*. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Michael J.mem Explanation: The -r option displays the files in reverse order. The -l command displays the files permissions. Question: 303 What command should you type to see all the files with an extension of 'mem' listed in reverse alphabetical order in the /home/ben/memos directory. Reference: http://www. D. The '*' is a wildcard which means that any file that ends with .com/linux/cmd/l/ls. ls -Af /home/username D. ls -l /home/username Answer: B. You can enter multiple filenames after the file command.oreillynet. New Riders.html Incorrect Answers: A. ls -c home B. C. command would take you up one level in the directory tree.

cat tom betty > friend C. You can combine multiple files into one file or append information to a file with the cat command. B. Display the contents of a file. You need the cat command. not the more command. ls tom betty > friends B. Sybex Linux + Study Guide: Page 654. D. C. Answer: D. It cannot be used to change the contents of a file (although it can add append data to a file). Change the contents of a file.com/linux/cmd/f/file. Reference: Roderick W. B.html Question: 305 Which of the following commands will combine the contents of the files tom and betty into a new file called friends? A. Question: 306 Which of the following cannot be accomplished with the cat command? A. not the ls command. page C. Append information to another file. Smith. D. Question: 307 Which of the following commands will display a file one screen at a time? A. Incorrect Answers: A. less B. Explanation: The cat command is typically used to display the contents of a file. Reference: Roderick W. There is no semi-colon (. The most common use of the cat command is to display the contents of a file. Sybex Linux + Study Guide: Page 654. Incorrect Answers: A. You need the cat command. cat betty > friends Answer: B. tr Page 112 of 217 . more tom betty > friends D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. cat tom. Smith. Create a new file.) between the filenames to be combined.oreillynet. Explanation: You can use the redirection operator (>) with the cat command to combine multiple files into one file. C. C. You can create a new file with the cat <filename> command.

B. D.oreillynet. What command should you use? A. Reference: http://www.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Server message block daemon.com/linux/cmd/cmd. The Server Message Block daemon provides this service. Which of the following must be installed for this server? A. The tail command is used to display the last ten lines of a specified file. tail B. less D. The cat command is used to display the contents of files but it will scroll down to the bottom of the file. It does not display the contents of a file one screen at a time. Explanation: Server Message Blocks (SMBs) are used by Windows clients for network communications.oreillynet. C. Tr is used to translate characters. Reference: http://www. Syslog daemon. Explanation: The less command will display the contents of a file one screen at a time. cat Answer: A. Answer: C.The head command is used to print the first ten lines of a specified file. head C. B. Explanation: less is a program for paging through files or other output. D. There is no page command. Question: 309 A customer needs a Linux server to act as a Microsoft Windows NT server.csp?path=l/less Incorrect Answers: A. C.html Incorrect Answers: B. log Answer: C. Reference: Page 113 of 217 . D. log is not a valid command. You want to watch the messages as they are being written to the log.com/linux/cmd/l/less. File transfer protocol daemon. Network file system daemon. Question: 308 You are debugging a new application that is crashing.

but does not want the extra jobs to print out when it comes back online. lprm Answer: A. lpd D. not to make it executable. lpr C. Sybex Linux + Study Guide: Page 354. The print jobs must be specified by job number which can be obtained using the lpq command. It accepts print jobs submitted by the lpr command. Question: 311 Which command enables a user to make a newly created shell script executable? A.oreillynet. B. C: Lpd is the line printer daemon. The 'lpc restart all <printername>' is used to restart the printer daemons on the specified printers.html Incorrect Answers B: The lpr command is used to send print jobs to a print queue.html Incorrect Answers A: /<filename> is not the correct command. chmod +x <filename> D. The +x option keeps the existing permissions and adds the execute permission. The syslog daemon is used to log system messages.com/linux/cmd/c/chmod.com/linux/cmd/l/lpc. D: /configure <filename> is not the correct command. She wants to power cycle the printer.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. Smith. Reference: http://www. lpc B. Reference: http://www. B: The chown command is used to change the owner of a file. you need to add the execute permission to the file. Explanation: To make a script executable. The Network File System daemon is used for communication between Linux computers. The chmod command is used to change the access mode (permission) of the file. Explanation: The 'lpc clean all <printername> command is used to remove files that cannot be printed from the specified printer queues. The File Transfer Protocol daemon is commonly used for transferring files across the internet. but nothing is printing out. Which command would she use to accomplish this? A. Page 114 of 217 . Incorrect Answers: A. D: The lprm command is used to remove specific print jobs from print queues. /<filename> B. She has sent several jobs to the printer. chown +x <filename> C. /configure <filename> Answer: C.oreillynet. Question: 310 A user is having problems printing to the network printer. D.

gz C. you should use the tar command.gz B. C: The file was created with the tar utility which called the gzip utility to compress the files. Which of the following commands will kill the process? A. Therefore. Therefore. su -c "kill 1010" Answer: D Question: 313 The administrator for a Linux server needs to update the system and downloads the required patch. The filename is "update. su "kill 1010" C. To uncompress the file.tar.gz Answer: B. untar -xzf update. gzip -p update. you should use the tar command to uncompress the files.tar.tar.gz D. kill 1010 B.tar.oreillynet.gz".Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 312 An administrator who logged in as a standard user needs to kill process 1010 that was started by the root user. gunzip -update. killall -9 1010 D. Explanation: Single user mode is known as runlevel 1. tar -xzf update. Question: 314 How could an administrator switch to single-user mode without rebooting the system? A. su -single Answer: B. cd /single D. D: Untar is not the correct command. Explanation: A file with the tar. Which of the following commands would be the best way to uncompress this file? A. init 0 B.html Incorrect Answers A: The file was created with the tar utility which called the gzip utility to compress the files. The z option is used to invoke gzip to uncompress the files and the f <filename> option is used to specify the filename. you should use the tar command to uncompress the files. You can change the runlevel by issuing the 'init <runlevel> command (in this case 'init 1'). The x option is used to extract the files. Page 115 of 217 .gz extension has been processed by two programs. init 1 C. Reference: http://www. The tar utility is used to 'tar' multiple files into one archive and the gzip utility is used to compress the files.com/linux/cmd/t/tar.tar.

hu/doc/LinuxShellScript/rpf. Kill 6894 : nice -n19 nmap <arguments> Answer: D. Explanation: The Kill command is used to kill the process. ls /tmp :: DoNotCreateBackup Answer: C. ls /tmp && DoNotCreateBackup C. C: Cd /single will change to a directory named /single.html Incorrect Answers A: Init 0 will change the system to runlevel 0. The default 'niceness' is 10. ls /tmp >> DoNotCreateBackup D. B: && is not a valid command redirector. bg nmap B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. the lowest priority is 19 and the highest is 1. Reference: http://www. a file named DoNotCreateBackup). D: Su -single will attempt to switch to a user named single. Page 116 of 217 .com/linux/cmd/i/init.netti. The -n19 option will lower the priority of the process. What command would accomplish this goal? A. bk nmap:6894 D. Question: 316 The following is the output from a ps command: PID TTY TIME CMD 1054 pts/1 00:00:00 bash 6894 pts/1 00:00:00 nmap 7123 pts/1 00:00:00 ps The nmap process has been taking up too much processing power. stop | back 6894 C.htm Incorrect Answers A: || is not a valid command redirector. The nice command is used to run a process with a lower priority. it will append it to a file (in this case. When using the nice command. Explanation: The >> symbols represent a command redirector.oreillynet. What command can be used to run nmap with less resources? A. ">>" will take the output of the ls /tmp command and instead of displaying it on screen. D: :: is not a valid command redirector. ls /tmp || DoNotCreateBackup B. CTRL-Q. Runlevel 0 is used to halt the system. Question: 315 An administrator needs to append the list of files in the /tmp directory to the existing file "DoNotCreateBackup".

ftp B.html Incorrect Answers A: FTP is used to transfer files using the FTP (File Transfer Protocol).Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www.com/linux/cmd/n/nice. Explanation: Telnet is used to access remote systems. telnet D. Returns the user to the parent directory of "ip". Telnet is the user interface that communicates with another host using the Telnet protocol. Explanation: The 'cd~' command is the same as the 'cd' command in that it will return you to your home directory. Question: 318 The current working directory is /var/spool/Tom/ip.com/linux/cmd/t/telnet.oreillynet. C: CTRL-Q. which is why your home directory is sometimes known as your login directory. it doesn't lower the priority of the process. Question: 317 The system administrator wants to connect to his servers remotely to create a new user.oreillynet. traceroute Answer: C. Returns the user to the root directory. Keeps the user in their current directory. B.redhat.html Incorrect Answers A: The bg command is used to run a process in the background. Answer: B. Your home directory is the default directory you are taken to when you log in. However. What does the command "cd~" do? A. D: Traceroute is another utility used to test IP connectivity by tracing the route to a remote host. Reference: http://www.html Incorrect Answers Page 117 of 217 . Reference: http://www. Returns the user to their home directory.3-Manual/getting-started-guide/s1-navigatingcd. C. B: Ping is used to test IP connectivity. D. Commands entered into a telnet console are executed on the remote system. (CTRL-Q is often used to turn all output stopped on screen back on). ping C. bk is not the correct command.com/docs/manuals/linux/RHL-7. B: Stop | back is not the correct command. Which of the following commands can be used? A.

C: The cd command is used to 'change directory'.org/docs/basics/bfiles2. D: /etc/users does not contain group information. C. Page 118 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A: To go to the root directory. you would have to enter the command: cd /. Explanation: The /var directory contains 'variable' system data such as log files. D. not the /usr directory. you would enter the command: cd. Question: 320 Why would setting up separate file systems for /home and /var be appropriate? A. Reference: Roderick W.. to go up one level). The drive has been partitioned and formatted with the ext2 file system. Explanation: The /etc/group file contains a list of all the groups and the members of each group. What needs to be done? A. Question: 319 Which Linux file shows which users have access to which groups? A. /etc/group D. /usr/users C. D: /var is not used to store old applications. Sybex Linux + Study Guide: Page 243. Administrators can separate user files from business files. It does not keep you in the current directory. Incorrect Answers A: The group file is in the /etc directory. or cd /var/spool/Tom. B. /etc/users Answer: C. Reference: http://www. It is a good idea to keep this data separate from the users' personal data stored in their home directories. D: To go to the parent directory of the ip directory (in other words. Users can access /home for their personal applications and /var can store old applications. Smith. C: There are no guest accounts in the /var directory. B. /usr/group B. The system is not subject to failure from log file or user quota overruns. Answer: A. B: /usr/users does not contain group information. Add the proper drive module to the kernel.mandrakeuser.html Incorrect Answers B: Quota overruns would not cause a system failure. Guests accounts included in /var are separated from user accounts kept in /home. She is complaining that the new drive must be mounted manually every time the computer is booted. Question: 321 A customer has installed a new IDE hard drive in a Linux system. Use a utility to edit fstab.

Where could this be configured? A. B: The HOWTO pages are very useful. View the HOWTO pages on the Web browser.bashrc C. C: The 'help' pages are known as manual pages and can be accessed using the 'man' command. using the man pages is quicker. rc. Reference: http://www. Smith. ~/. Sybex Linux + Study Guide: Page 400/1. Reference: Roderick W. Page 119 of 217 . Question: 323 A user wants to have a custom software daemon run each time the system starts.html Incorrect Answers A: Searching the distribution documentation CD (if there is one) would be a long way of doing it. B. This information includes who can mount the filesystems and whether the filesystem should be mounted automatically at system bootup.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. Question: 322 A technician discovers that the route command is being used incorrectly. Answer: A. not the help command. Incorrect Answers B: No drive module needs to be added to the kernel as the filesystem can be mounted manually. Change the runlevel to reflect the number of partitions in the system. Explanation: Every system has manual pages installed by default. Explanation: The fstab file contains information about the filesystems. you would type 'man route'. To display information about the route command. Which of the following resources is the quickest means of finding examples of correct usage? A. Answer: D. D: It is not necessary to change the runlevel. Use the built-in help pages by typing "help route". D. You can access the manual pages using the 'man' command. However. Add the drive information to the /dev directory.com/linux/cmd/m/man. C: The drive information must already be in the /dev directory as the filesystem can be mounted manually. Search the distribution documentation CD. The manual pages contain information about various commands including the syntax and the correct usage for each command.local B. Use the built-in manual pages by typing "man route". C. inetd. /etc/profile Answer: A.oreillynet. D.conf D.

html Incorrect Answers A: The dd utility cannot be used to locate system log files. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Rc. C.local file exists in the /etc directory or a script subdirectory such as /etc/rc.local file. For this reason. Inetd starts server processes when they are requested. Question: 324 For which of the following reasons could the dd utility be used? A. The boot sector is corrupt and needs to be replaced. Question: 325 At boot time. To create a bootable Linux system disk.d.com/linux/cmd/d/dd. Explanation: The 'dd' utility is used to take input from an input file (IF) and output to an output file (OF). Inetd could be used to start the custom daemon. Smith.local is a startup script that can be configured to start processes or daemons when the system boots up.conf is used to configure the inet daemon. D. To automate editing system configuration files. Answer: D. Sybex Linux + Study Guide: Page 394. It is not used to start daemons. The file system has become corrupt and needs to be repaired. B: The dd utility cannot be used to create a Linux system disk. Answer: B Explanation: Page 120 of 217 . To locate and access system log files. What is the problem. The rc. You could use this to read information about hardware by taking input from the hardware configuration files and output this information to a single file. The partition table has become corrupt and needs to be repaired. the computer reported that there are problems with inodes and blocks. To automate access to system hardware information. and how is it corrected? A. The drive is configured using an improper file system and needs to be reformatted. Reference: Roderick W. but it won't start the daemon until it receives a request for it. B. C: Editing system configuration files cannot be automated because the configuration information would be different each time. Incorrect Answers B: The bashrc file is used to set environment variables for the BASH shell. Reference: http://www. C. and therefore should be manually entered into the files. It is not used to start daemons. D: The /etc/profile file is used to set defaults for environment variables.oreillynet. C: Inetd. it is better to use the rc. D.

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 If you get errors about inodes and blocks during system boot up. the boot loader would not be able to run. B: It is possible that the keyboard is faulty. Answer: D. Reboot the machine. the port number. Which of the following actions should be done first to try to solve the problem? A. This would not result in inode or block error messages. it will print the protocol.ca/faqs/section4. Explanation: Netstat is a TCP/IP command used to show the network status. C. the number of bytes to be sent.html Incorrect Answers A: If the boot sector was corrupt. Check to see if root can login. the number of bytes waiting to be received. C: You would check to see if root can log in if you were sure you're password is correct and the Caps Lock is off. You should use a disk repair utility such as fsck to attempt to recover the filesystem. the remote address and port. Question: 326 A user is attempting to login to a Linux machine but her password keeps getting rejected. lsport C. The -t option with Netstat is used to display just the TCP ports.oreillynet.uwinnipeg. Incorrect Answers A: Restarting the machine won't affect someone's ability to log on if their password is wrong. Question: 327 A customer wants to determine which TCP ports are in use on his Linux server. minicom D. the most likely problem is that you have a corrupted file system. Reference: http://www.com/linux/cmd/n/netstat. but it is more likely that the Caps Lock is on. D. you would not get errors related to a corrupted filesystem because the filesystem hasn't been read yet. tftp B. This can be caused by improperly shutting down the machine. Which of the following commands should be used? A. The most common cause of logon failure due to a rejected password is the keyboard Caps Lock being on. Check to see if <Caps Lock> is on. B. Therefore. netstat Answer: D.html Incorrect Answers Page 121 of 217 . Reference: http://theory. Replace the keyboard. the system would not be able to find the partitions. For all active sockets. Explanation: Passwords are case sensitive. and the state of the socket. C: If the partition table had become corrupt.

However. If the tape drive failed the diagnostics.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A: TFTP (Trivial File Transfer Protocol) is used to transfer files. Inspect the tape media with appropriate utilities. B: Performing a test restore is a good way of testing a successful backup. If the tape media proves to be faulty or the restore fails. C. Question: 328 An operator is concerned that errors occurred during the last tape backup.html Incorrect Answers A: /boot does not contain the messages displayed at boot time. Question: 329 A customer wants to identify all of the services that were initially loaded by his server upon boot and compare these with services that are currently running. B: The dmesg utility can be used to display boot messages. D. examine /etc/init. it still doesn't necessarily mean that the backup was unsuccessful. Answer: C. D. to display the currently running processes. Reference: http://www. How should he look for this information? A. Explanation: If you are concerned about possible errors during a backup operation. Page 122 of 217 . Run a diagnostic of the tape drive. This will include the services being started at boot time.log and run "ps -ax". you need to use the ax options with the ps command. The tape drive may pass the diagnostics. D: Inspecting the tape media should be done as tapes do wear out after a while. You should also test the backup by performing a test restore and inspect the tape media. Answer: D Explanation: The /var/log/boot. not TCP ports. B. but that wouldn't guarantee that the backup was successful. examine /var/log/dmesg and run "ps -e".com/linux/cmd/p/ps.log file will contain all the messages displayed at boot time (plus any other system messages).d and run "whatis -x". Incorrect Answers A: Viewing the log file is the first thing you should do. then you would know that the backup was unsuccessful. Which of the following is the LEAST helpful in determining that a successful backup was performed? A. Running a diagnostic of the tape drive is probably the least helpful of the answers given. Perform a test restore.oreillynet. examine /boot and run "ps-ef". B. The ps -ax command will display all currently running processes. not to display TCP port information. View the log file. B: Lsport is used to list printer ports. the first thing you should do it to check the log files. C: Minicom is a utility used for connection modem dial up connections. C. examine /var/log/boot.

This is not necessary.com/linux/cmd/p/ps. then you know that http is running. C. How could an administrator verify that HTTP services are running after a default installation? A.log. The grep http command will take the output from the ps aux command and search it for any occurrences of 'http'. This information would be in /var/log/boot. Run "rpm -rebuilddb". 'Httpd restart' would restart the httpd process. Answer: D. Run "ps aux | grep http".com/TUTORIALS/LinuxTutorialSysAdmin.html Incorrect Answers A: The finger command is used to display information about users. B.yolinux. The output of this command is then handed to the grep command using the pipe (|) redirector. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C: Whatis is not used to display the currently running processes. D: /var/messages is the wrong file to verify that the service started. but it isn't used to tell you if the process is currently running. Run "finger http". C.oreillynet. View /var/messages to verify that the service started. Reference: http://www. B: The 'restart httpd' command incorrect. not about processes. Reference: http://www.html#RPM Incorrect Answers A: "rpm -initdb" is used to build a new database. D. Explanation: The ps aux command is used to list all currently running processes. D. Question: 331 The administrator uses the rpm command to install a new software package but he gets the following error message: cannotget exclusive lock on database error:cannot open /var/lib/rpm/packages. Check whether a second instance of rpm is already running. Run "rpm -initdb".rpm What is the best way to solve the problem? A. Page 123 of 217 . Copy the package to the directory /var/lib/rpm/. Explanation: The error stated in the question is usually caused by another instance of rpm already running. Run "restart httpd". Question: 330 A user is trying to connect to a system via HTTP. Answer: C. Killing the other rpm instance should solve the problem. If any occurrences of http are found.

where is bob >> bob_groups. The output of this command is placed into a file name bob_groups.com/linux/cmd/g/grep.oreillynet. This may solve the problem but it is not the first thing you should try. The only thing wrong with the command is that is has two redirectors together ( | followed by >). B: LI being displayed has nothing to do with the video driver. Using the > redirector. This indicates that LILO is installed. C: The find command is used to find files. C: The error "cannot open /var/lib/rpm/packages. it is unlikely that the first stage of LILO (LI) would be able to run.txt using the > command redirector. Page 124 of 217 . Explanation: The grep command is used to search files for occurrences of a string .txt C . Otherwise. Answer: D. LILO is not installed.netti. it indicates that the first stage boot loader was able to load the second stage boot loader. Reference: http://www.html http://www.txt D .rpm" suggests that the package exists in the directory. cat groups | grep bob | vi > bob_groups. Question: 333 A Linux system boots up with only "LI" instead of LILO.in this case bob in the /etc/group file.grep bob /etc/group > bob_groups. Explanation: If LI is displayed during bootup.txt will be created if it doesn't already exist. B. What does this indicate? A. Reference: http://www. The second stage bootloader was unable to start.find /etc/passwd bob >> bob_groups.txt Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B: "rpm -rebuilddb" is used to rebuild an existing database. but has failed to execute it. The hard drive is not functioning properly. The video driver is corrupted.txt B .hu/doc/LinuxShellScript/rpf.htm Incorrect Answers A: The whereis command is used to locate the binary file and man pages for a command. the file bob_groups. C.cd /etc. C: If the hard drive wasn't functioning properly.cc/howto/liloerrorshowto. D.linuxpeople. Question: 332 What is the quickest way to create a file that lists all the groups to which the user 'bob' belongs? A .htm?link Incorrect Answers A: LI was displayed. not to find occurrences of a string within a file. you would get an error saying it couldn't find the file. D: This command would almost work but it is a long way of doing it.

log file contains system messages. Incorrect Answers A: The wtmp file contains information about logins. An IP conflict between the cards caused networking services to fail at boot. B: It is possible to run an onboard and expansion NIC in the same PC.log D. Question: 336 Using which of the following commands creates a risk of destroying data on a mounted file system? Page 125 of 217 . What is the problem? A. Reference: Roderick W. /var/log/messages would be the first file to look at to determine the problem. Explanation: The most likely cause of the problem is that both network cards are configured with the same IP address thus causing a conflict. A motherboard defect caused both cards to stop functioning properly. messages Answer: D ? Explanation: The boot. C. Therefore. C: The boot. Question: 335 The server has been rebooted after a kernel panic. D: It is very unlikely that the kernel would swap the identification of the NICs. Therefore. Smith. After the network services are restarted. /var/log/messages would be the first file to look at to determine the problem. the correct drivers are installed and are supported by the kernel. B: Dmesg displays the kernel messages displayed at bootup.log file may contain some indication of the problem. It is not possible to run an onboard and expansion NIC in the same PC. Answer: C. Incorrect Answers A: Both network cards have link lights. neither network interface device has network connectivity. B. Which of the following files can be viewed to try to determine the problem? A. A PCI network interface card is inserted into an empty PCI slot and configured as 'eth1'. The /var/log/messages file will contain error messages generated by the kernel before the machine was rebooted. D. dmesg C. wtmp B. Examining this file might give some indication of the problem. it is unlikely to be a motherboard problem. Both devices have link lights. We need to see the error messages generated before the reboot. Sybex Linux + Study Guide: Page 609. however. There is no error message generated.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 334 A system with an existing Linux installation has an onboard network interface already configured as 'eth0' that is functioning properly. The kernel swapped the identification of the NICs causing neither to operate properly. boot.

com/linux/cmd/m/mkfs. When you know the cause of the problem. It would not cause the loss of data. fsck B.oreillynet. Test a possible solution. Running this command on a filesystem that is already mounted would just generate an error message. B. Although this can cause problems if the filesystem is mounted as read only. Make a hypothesis about a solution.html Incorrect Answers A: Fsck (file system checker) is used to check the file system for errors.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Question: 338 Which of the following is NOT a valid SCSI connector? Page 126 of 217 . setserial Answer: B. It would not cause the loss of data on a mounted filesystem. C: The mount command is used to mount a filesystem. it is not as dangerous at the mkfs command. mkfs C. Answer: A. C. Try to modify the configuration files. Explanation: The mkfs command is used to create a filesystem on a hardware device such as a hard disk or a mount point. C: You need to know the cause of the problem before you can try to find a solution to the problem. Question: 337 What is the first step in troubleshooting a system problem? A. D: Setserial is a program designed to set and/or report the configuration information associated with a serial port. Creating a new filesystem over an existing filesystem will destroy the data on the existing filesystem. Explanation: The first step in troubleshooting should always be to collect information about the problem. This information can determine whether the problem is hardware or software related. and what the possible cause of the problem could be. D. D: You need to know the cause of the problem so that you know what configuration changes to make. Incorrect Answers B: You need to know the cause of the problem before you can test a solution to the problem. Collect information. you can try to find a solution to the problem. Reference: http://www. mount D.

Question: 339 Exhibit: Which of the following types of memory modules is shown in the exhibit? A.htm Incorrect Answers A: This is a DB 25 connector.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C.uk/Products/Products. SIMM B.html http://www.ramelectronics.co. SIPP Answer: B. Explanation: This is a DB15 connector commonly used to connect to VGA monitors. D: This is a 50 pin Centronics connector. B: This is an HD 68 connector. DIMM C. Reference: http://www.htm Page 127 of 217 .com/HD-DB-15. Explanation: The exhibit shows a 168 pin DIMM.net/html/scsi_connecters. RIMM D.nullmodem.orcalogic. Reference: http://www.

The Network Filesystem (NFS) protocol provides transparent remote access to shared files across networks. It is not needed to enable the use of Gnome or KDE. Exportfs Answer: A. Video Card D. It is not used for exporting or importing directories.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers A: This is not a SIMM.org/doc/en_US. SCSI Card B. Network Card Answer: C. However. Smith.freebsd. Question: 341 A medium-sized business wants to use GNOME or KDE. The NFS protocol is designed to be portable across different machines. D: This is not a SIPP. Sybex Linux + Study Guide: Page 145. operating systems. C: This is not a RIMM. and transport protocols. NFS B. you will need a graphics card otherwise known as a video card. Reference: Roderick W. network architectures. Which of the following hardware components is required? A. Explanation: Gnome and KDE provide graphical desktop environments for Linux computers. C: Squid is a web proxy program. Explanation: The NFS service (Network File Service) is used to share directories on a network. D: Exportfs is a command used to export directories. Squid D.ISO8859-1/books/handbook/nfs. Reference: http://www. Page 128 of 217 . To use these graphical desktop environments. it is the NFS service that is responsible for the exporting and importing of directories. tftp C. It is not used for exporting or importing directories.html Incorrect Answers B: TFTP (trivial file transfer protocol) is used to transfer files across a network. Question: 340 What Linux service is responsible for exporting and importing directories with another system on a network? A. Modem Card C. Incorrect Answers A: A SCSI card is required if you have SCSI devices.

In this question. Application Server Answer: B. Question: 343 A client requires a system that is able to store all of his customer records and records of transactions. portmap Answer: A. D: A network card is required if you want to connect to a LAN (local area network).org/linux/db. This information could be about anything. D: Portmap is used with NFS to mount filesystems. you have network connectivity. What type of server should the client implement? A. It is not used for name resolution. a common use of a database is to store customer information. You are unable to ping the hostname which means you have a name resolution problem. you can ping the server's IP address. Squid C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B: A modem card is required if you want a dial up connection (to an ISP for example). Connection attempts from the clients to the hosts generate "unknown host" errors. Pinging the server's IP address from a client is successful. xinetd D. A database server is a network server hosting a database. What service needs to be added to the network to fix this issue? A. It is used to start services on a Linux computer. It is not needed to enable the use of Gnome or KDE. C: Xinetd is the Linux 'superserver'. DNS is used to map hostnames to IP addresses. therefore. It is not needed to enable the use of Gnome or KDE.isc. Reference: http://www. It is not used to store customer information. Reference: http://linas. but the new network is not working. Proxy Server B. Page 129 of 217 .org/products/BIND/ Incorrect Answers B: Squid is a web proxy program. that can be accessed by workstations on the network. Explanation: A database is used to store information.html Incorrect Answers A: A proxy server is used to provide an internet connection and web caching functionality. Messaging Server D. BIND B. Question: 342 A customer installed a new intranet in their company. However. Adding the DNS service (BIND) to the network will solve this problem. Explanation: BIND (Berkeley Internet Name Daemon) is a common type of DNS service. Database Server C.

Explanation: The 'top' command is used to display information (frequently refreshed) about the most CPUintensive processes currently running. it does not display the processes with the highest priority. It is easier to use the top command to display just the most CPU-intensive processes. Use the command "renice" to show the processes with the highest priority.oreillynet. C: The 'jobs' command to not display a constantly updated list of CPU-intensive processes. However. D: The ifconfig command displays information about the active interface including packets received/sent. Use the command "jobs" to give a constantly updated list of CPU-intensive processes. However. If a process is using an excessive amount of CPU time. It is not used to store customer information. Computer hostname D. D: An application server is used to provide access to applications to workstations on a network.com/linux/cmd/i/ifconfig. The information includes the IP address. Page 130 of 217 . Answer: D. killing or restarting the process may improve system performance. Active network interface Answer: C. C. Reference: http://www. the hardware (MAC) address. Use the command "top" to give a real-time updated list of processes ranked by CPU usage. Question: 345 The system administrator notices that the system is running slow. It is not used to store customer information. Reference: http://www. B: The ifconfig command displays the MAC address. B: The ps a command will list all running processes. Ip address B. Mac address C. B.com/linux/cmd/t/top. and the active network interface.html Incorrect Answers A: The renice command can be used to adjust the priority of a process. Use the command "ps a" to list the top five processes with the highest priority.oreillynet. What should be done to find the processes that are using the most resources? A. Explanation: The ifconfig command is used to configure a network interface or to obtain information about the network interface. Question: 344 Which of the following information is NOT returned by ifconfig on a machine connected to an Ethernet network? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C: A messaging server is used to provide messaging functionality on a network. it does not display the hostname of the computer. D.html Incorrect Answers A: The ifconfig command displays the IP address.

rpm Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 346 Which of the following commands is used to obtain the summary of hard disk partitions? A. A script will be created that will be executed daily as a cron job.rt. The v and h options are used to display a series of pound signs (#) to indicate the progress of the installation/upgrade. a package with the same name must not already exist on the system. Question: 347 Which of the following can be used to apply the package "package-update-3. Reference: Roderick W. rpm --update package-update-3.rpm D.i386. It is not used to display partition information. fdisk -l Answer: D.5. listing various options. D: Update is not the correct option to upgrade the package.8. C: Fsck is used to check the filesystem for errors. Explanation: The U option used with rpm is used to install a package or upgrade an existing package.i396.i386. Reference: http://www. rpm-Uvh package-update-3. fsck B. The fdisk command on it's own does not display partition information.html Incorrect Answers A: Fsck is used to check the filesystem for errors. fdisk C.5. The -l option is used to display information about all the hard disk partitions. Sybex Linux + Study Guide: Page 178/9. This will display information such as the installed files for the package.5.rpm B. B: The fdisk command with no options will start a menu driven program.rpm" to the original rpm package? A.com/man/fdisk. It is not used to display partition information. Incorrect Answers A: The qa options are used to query the installed packages.5. when using the i option to install a package. fsck -l D. However. Explanation: The fdisk command is used to create/view hard disk partitions.i386. Question: 348 An assistant network administrator has just been assigned the task of performing a daily check of the security system. rpm -ivh package-update-3. Smith. rpm -qa package-update-3. Which of the following commands can be included in the script which directly relates to enhancing and checking the system security? Page 131 of 217 . C: The i option is used to install a package.5i386 rpm C.

B: The chmod command is used to change the permissions on files (in this case. However. The user is configured for X login.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. just noting any file system errors would suffice. It is often helpful to know the exact version of your hardware drivers. Answer: A. C. What does this indicate? A. Page 132 of 217 . B. Which of the following written records is the most important to maintain? A. The user account is disabled.0. every file on the system). find /-name * >> /var/log/daily B. This would result in a list of every file on the system. This doesn't improve security. Updates to hardware drivers. New users added to the system. Reference: http://www.html Incorrect Answers A: This command would search / (the root directory) for any (*) filename and list the output in the /var/log/daily file. C: Documenting new users is not necessary. It cannot be used to enhance security. Incorrect Answers B: Documenting updates to user passwords is not necessary. find / -perm 4000 >> /var/log/daily D. Explanation: Setuid executable files can be run as the file owner rather than the user running the file. chmod -R 4000 / >> /var/log/daily C. You can use the find / -perm 4000 command to search for setuid files. Question: 350 The /etc/passwd file for a Linux system has an "x" in the second field. The user is required to change the password at next login. Question: 349 An administrator needs to maintain a log of work performed on a Linux server. This can be a security risk as it could give an intruder root access to your system.intersectalliance. B. Explanation: Documenting work performed on a server is very important for troubleshooting purposes. Updates of user passwords. File system check times and results. D: Documenting file system check times could be useful as it could indicate a deteriorating hard disk. A list of user accounts can be obtained at any time. The system is using shadow passwords. D. This will make it easier for an administrator to know if he/she has the most recent version of the drivers. C. Documenting the actual passwords is definitely not recommended. The output of the search is appended to a file called /var/log/daily with the >> redirector. D.com/projects/LinuxConfig/LinuxConfig-4. grep -Ril root /ect/* >> /var/log/daily Answer: C. D: This command would search every file in /etc/ for an occurrence of the word root.

Explanation: To delete the files. What is the industry-recommended method to do this? A. she should make a new crontab while logged in as root. D. Answer: B. Run logcp at each server. Modify the syslog. B: The x does not mean the account is configured for an X login. Incorrect Answers A: If she used a shell script. What can she do so the cron job performs correctly? A. Explanation: The second field is the password field. she would still need the necessary permissions to delete the files. Linux distributions that use shadow password files typically place an 'x' in this field. Log in as superuser and delete the files manually. Smith. C. To ensure she has the necessary permissions.conf file on each server so log files are forwarded to 'loghost'. the password field would contain a '*'.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. D: The x does not mean the user is required to change the password at next login. Specify the administrators workstation as the destination and "*" for which log files to forward. C. This will make the cron job run with root permissions. Others place the encrypted password in this field. Create a script on each server to analyze each of the log files on the server and forward important information to the administrator's workstation. Write a shell script to remove the files. Sybex Linux + Study Guide: Page 273. However. Edit her user crontab while logged in as superuser. Reference: Roderick W. B. C: Deleting the files manually is unnecessary. Answer: B. Incorrect Answers A: If the user account was disabled. she notices several days later that some of the files have not been deleted. Make a new crontab while logged in as root. Explanation: Page 133 of 217 . Question: 352 A system administrator of a 200-server network wants to simplify routine monitoring of log files on each server. and successfully delete all the files. B. Create a script on the administrator's workstation to attach to each server and copy its log files to the local drive. D. she must have the necessary permissions on all the files. Create a new server called 'loghost'. Question: 351 A user creates a cron job that deletes all files in /tmp and /var/tmp on her home machine each night. D: Editing the crontab won't make the cron job run with root permissions.

/run_file -su root". the file will run with root permissions when any user runs the file. Incorrect Answers A: '. Reference: Roderick W. C...' directory isn't created by a process at login.. B: The chroot command is not used to run a command as root. Incorrect Answers A: You shouldn't store important log files on a workstation.conf file on each server to configure the servers to save their log files on the central logging server. However. Which of the following will allow that to happen? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 To simplify the monitoring of log files.." is an indication of possible file corruption.. D. Explanation: The '. Page 134 of 217 . You can modify the syslog. For example. B. C: Editing the login files will not enable a user to run a program as root.' directory is not created by default. D: It would be difficult to define 'important information' in a script. D: A '. Answer: B.. C: The '. Run " . Explanation: The Set User ID (SUID) option is used in conjunction with executable files. you should use a central logging server.. C. Someone must have created it. Leave the directory as it is because "... B. Incorrect Answers A: The su command is used to 'switch user' and open a shell with the permissions of that user. Lock the directory and examine its contents to determine if this is a security risk. Answer: D.' (2 dots) refers to the parent directory.' does not refer to the parent directory.." was created by a normal system process at login. Which of the following actions should the administrator take and why? A.. rather than with the permissions of whoever runs the file.. D. Use the chrootcommand. C: This would have to be done every time you wanted the logs copied to your machine. if the root user owns the file.. Edit the users ". the syntax in this answer is incorrect..." in his home directory. and he did not create this entry. and tells Linux to run the program with the permissions of whoever owns the files. Question: 354 Users on a machine need to run the command run_file that requires superuser permissions in order to write to other files. you should lock the directory and examine its contents to determine if this is a security risk. Question: 353 A user tells the administrator that he has found the entry "..' directory doesn't indicate possible file system corruption.login" files. '." refers to the parent directory.. Leave the directory as it is because the ". Therefore. Sybex Linux + Study Guide: Page 254. Run fsck on the /home partition because the ". Change run_fileto a SUID command. Smith.

bak". Question: 357 Which of the following commands. Answer: C. protects a file named classic from being deleted by root? Page 135 of 217 .oreillynet. From the directory containing the file to be backed up. Explanation: The best way to preserve the original version of a file or kernel is to make a backup of it. Question: 356 How can an original file or kernel be preserved before being updated or patched on a Linux system? A. B: Zcat is not used to create an archive. when issued. not to compress them. Answer: C. if the utility exists. D: Files and kernels can be preserved by making a backup copy of them. Which of the following is the best way to do this? A. C. Use tar with the "z" option to create a compressed archive in one step. the Update Protection Utility in X to protect the original file or kernel. which is saved in /usr/src. Use zcat to compress all of the files and then tar to create an archive. Explanation: Tar is the best utility to use to create an archive containing multiple files. It is used to list the contents of an archive.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 355 A user has accumulated over 500 MB of programs stored in 25 directories. Files and kernels cannot be saved because the updates will permanently overwrite the originals by default to eliminate the possibility of version conflicts.html Incorrect Answers A: Gunzip is used to uncompress files. B. It is used to list the contents of an archive. Reference: http://www.com/linux/cmd/t/tar. Use zcat to create an archive and use gzip to compress the archive. The command to copy a file is 'cp'. Use the upu. D. However.oreillynet. C. B: I don't know if there is an 'Update Protection Utility'. Use gunzip to create a compressed form for each file. type "cp <original file or kernel name> <original file or kernel name>.com/linux/cmd/c/cp. The z option invokes the gzip utility to compress the files as part of the archive creation process. Edit the /etc/profile/changelog file and add the filename or kernel version to be backed up. Reference: http://www. D: Zcat is not used to compressed files. The easiest way to create a backup of a file is to make a copy of it. it is still not the easiest way to preserve an original copy of a file.html Incorrect Answers A: Editing the /etc/profile/changelog won't preserve an original copy of a file. B. Now he would like to backup the programs to his home computer by creating a compressed archive and then using ftp to transfer the data to his computer at home. D.

The installation type step.? A. You want the Linux installation program to search for bad blocks. chattr +c classic B. D. Answer: B Question: 361 Which of the following can you use if you want to configure a Linux computer only as a firewall? A. when added to the /etc/crontab file. A user will kill the process named 392. The Linux Loader (LILO) configuration step. chmod a-rwx classic Answer: B. Question: 362 Page 136 of 217 . The hard disk formatting step. B. C. B. C. Question: 360 Which of the following best describes what will occur when the su -c 'kill 392' root command is issued and a valid password is entered? A. iptables D. Which steps in the Linux installation process for most Linux distribution enables the installation program to search for bad blocks? A. and the process with PID number 392 will be terminated. which was started by root. D. The root user will kill all of the processes that were started by root. will run the cleanup script on the first day of every month at 2:05 A.M. chmod 000 classic D. A user is given root-level permissions.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. A user is given root-level permissions. and the processes started in March of 1992 will be terminated. The hard disk partitioning step. Question: 358 You are installing the Linux operating system on a computer. 5 2 1 * * cleanup D. Question: 359 Which of the following lines of text. 5 2 1 1 * cleanup C. Answer: A. Apache B. Squid Answer: C. 2 5 * * 1 cleanup Answer: C. 2 5 *1* cleanup B. BIND C. chattr +i classic C.

The name of each installed package will be displayed. D. C. PCI modem B. There are no Linux drivers installed. ISA sound card D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Your Linux computer has a serial mouse on COM1. PS/2 mouse B. All of the packages installed on the computer will be verified. There is a SCSI ID conflict. Question: 363 Which of the following statements best describes what will happen when the rpm . Connecting the modem to which of the following ports can cause the modem and mouse to malfunction? A. D. What is the most likely cause? A. Answer: C Question: 366 Which of the following devices are hot-swappable? A. Question: 364 Which device normally uses a DMA channel? A. COM3 C. Cable video tuner Answer: C Question: 365 A technician installs a SCSI card and three SCSI devices on a new system. You want to connect an external modem to the computer. COM2 B. Parallel port printer Answer: C Question: 367 Page 137 of 217 . The name of each file contained within a package will be displayed. C. B. There is an I/O address conflict. B.qa command is issued? A. Detailed information about an installed package will be displayed. There is an Int13h conflict. COM4 D. Answer: A. CardBus network card D. The system does not recognize any of the SCSI devices or the controller. USB Answer: B. AGP video card C. Laser Printer C.

Answer: C Question: 368 A user replaces an old 4 GB IDE drive with a new 30 GB IDE drive. D. Bootstrap Answer: B Question: 370 ATAPI technology is a standard for which of the following items? A. Reboot the system. During the installation process. which test examines the CPU. 10Base2 B. in what type of I/O bus should the card shown be used? Page 138 of 217 . Mass storage devices D. B. Reconfigure the COM ports. The hard disk controller has no LBA capability. Now. C. B. Which of the following will most likely correct the problem? A. C. 10Base5 C. DIOS D. Modulater/demodulater Answer: C Question: 371 Unshielded twisted-pair is used for which of the following networks? A. Linux recognizes only 8 GB of the available disk space. Reinstall the modem drivers. Power supplies C. The BIOS does not support larger hard drives. The value of the hard disk size in the CMOS is set incorrectly. POST C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user adds a serial trackball to his system. neither the existing mouse nor the trackball work. Perform a BIOS upgrade. Answer: A Question: 369 During a cold boot of a system. 10BaseF D. memory and video? A. D. The hard disk has to be low-level formatted to access the full capacity. 10BaseT Answer: D Question: 372 Based on the exhibit. Which of the following is most likely the problem? A. CPUs B. CMOS B.

The CPU is not seated properly. PCI B. Which of the following has most likely caused this problem? A. Answer: B Question: 375 A new PC is delivered to the site. Upon the initial power up.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. there is no video display. no beeps are heard. C. Answer: C Page 139 of 217 . PCI bridge C. B. D. The mouse is not connected. CPU fan B. The diskette drive has failed. EISA D. MicroChannel Answer: A Question: 373 Which of the following is a field replaceable unit? A. C. Flash the BIOS with a binary or HEX file. Onboard SCSI controller Answer: A Question: 374 The current BIOS version on two workstations does not support the processor that will be installed. but the same motherboard with new BIOS version does. but the hard drive and fans power up. B. Use the debug command to copy the BIOS from a new motherboard. The network card is not installed. Replace the old motherboard with a new one. D. Update the CMOS using a HEX editor. Which of the following is the best way to resolve the problem? A. Lavel 1 cache D. ISA C.

PS/2 C. what port would he use to connect a CAT5 cable to establish a connection on the network? A. The IDE hard drive is corrupt C. HD-68 D. A DIMM is failing B. The software is not compatible with the hardware Answer: A Question: 377 A user has just purchased a new external modem and wants to install it on his Linux desktop workstation. B. When a user installs his new Linux desktop computer. A. C D. D Answer: B Question: 379 Exhibit Page 140 of 217 . What port on the workstation would be used? A. USB B. The IRQ settings are incorrect D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 376 Which of the following can a parity error indicate? A. B C. RJ-11 Answer: A Question: 378 Exhibit Study the exhibit.

D Answer: B Question: 380 What should be terminated on a SCSI bus with one internal hard drive and one external CDROM? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Study the exhibit. The hard disk needs a new MBR. Answer: D Question: 382 What is the difference between "shutdown -h now" and "init 0"? Page 141 of 217 . hard drive. The SCSI interface card only C. B C. Which of the following most likely caused the problem? A. C. The SCSI controller. He then connected a ribbon cable to the new hard disk. The hard drive only B. The hard disk drive was not low-level formatted first. but the system did not boot. A user wants to install an external CDROM drive onto a system. The ribbon cable was inserted backward on the hard disk. Both the hard drive and the CDROM drive D. and CDROM drive Answer: C Question: 381 A user installed a new hard drive into a system with an existing hard drive. B. C D. A B. D. The controller was damaged by an electrical discharge. Which interface should be used? A. He powered on the computer.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A. "init 0" does not power down the Linux system B. "init 0" does not halt the system during power down C. "init 0" does not send a broadcast message to logged-in users D. "init 0" does not stop services before powering down the system. Answer: C Question: 383 An administrator recursively copies the /home directory to a new hard drive using the command cp -R /home /usr/home What further actions are required, if any, to make the files accessible to the users? A. Give executable permission to the users on the new home directory. B. Change ownership of the files, and assign directory permissions to users. C. Change ownership of the files; directory permissions are automatically assigned. D. No further action is required. All permissions are replicates using the cp command Answer: B Question: 384 Which of the following commands is issued to create the group 'sqleditors' on a system? A. group +sqleditors B. addgroup sqleditors C. groupadd sqleditors D. echo sqleditors:x:601: > /ets/groups Answer: C Question: 385 A software developer completed his annual report yesterday. He is now trying to print the report and submit it to his supervisor; however, he has forgotten the name and path of the report file. Which of the following commands can be used to obtain a listing of recently modified files? A. locate -t2 B. find / -mtime 2 C. whereis -time 2 D. grep / -ctime 2 Answer: B Question: 386 A user logs onto the system as root. He attempts to execute the script file a,sh. He is getting the message "Execute permission denied". What command must be used before the file can be executed? A. chgrp B. chown C. chmod D. execute Answer: C
Page 142 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 387 Which of the following commands creates a tar file called back.tar that contains all files ending with extension ".c" in the current directory? A. tar back.tar *.c B. tar xvf | *.tar *.c C. tar cvf back.tar *.c D. tar cvzf | *.tar *.c Answer: C Question: 388 Where are log files normally found? A. /bin B. /etc C. /tmp D. /var Answer: D Question: 389 A user wants to load a PDF file from the CDROM. What command would allow the user to access this file? A. mount -dos /dev/cdrom B. mnt /dev/cd0 /mount/cdrom C. mount -t vfat /mnt/cdrom /dev/cdrom D. mount -t iso9660 /dev/cdrom /mnt/cdrom Answer: D Question: 390 Which of the following commands can be used to place print jobs in the print queue? A. pr B. lpq C. lpr D. lprm Answer: C Question: 391 Which of the following strings indicate that the input of the program called printData should be redirected from the file calles "myData"? A. printData . myData B. printData > myData C. printData < myData D. printData | myData Answer: C Question: 392
Page 143 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

What is the most secure way to connect to a remote machine? A. ssh B. ftp C. http D. telnet Answer: A Question: 393 Which of the following commands will create 'bsmith' as a user in the group 'web_users'? A. useradd bsmith web_users B. useradd -g web_users bsmith C. useradd web_users bsmith D. groupadd -group web_users bsmith Answer: B Question: 394 A Linux system administrator has forgotten the root password. Which of the following would be the best way for the system administrator to gain access to the machine? A. Reinstall Linux. B. Enter runlevel 0 and run passwd. C. Reboot and use the mdrecovery utility. D. Reboot, enter Linux single-user mode and run passwd. Answer: D Question: 395 Which of the following commands kan be used to save and resume editing the file in the vi editor? A. :w B. :x C. :v D. :s! Answer: A Question: 396 How can the X Window manager be restarted? A. Press <Ctrl><Alt><Delete> B. Press <Ctrl><Alt><Backspace> C. Press <Ctrl><Alt><F5>, login, and type "startx" D. Change consoles and type the command "kill -9 X" Answer: B Question: 397 What information about the user does the "x" provide in the following line in the /etc/passwd file? chris:x:501:501:chris smith:/home/chris:/bin/bash A. The user is disabled.
Page 144 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

B. The user has no password. C. The user has a blank password. D. The user has a shadow password. Answer: D Question: 398 Which of the following commands should be used to move the file named John1 from the directory /home/j/john/temp to /home/j/john/save? A. mv /home/j/john/temp/john1 /home/j/john/save B. mv /home/j/john/save /home/j/john/temp/John1 C. mv /home/j/john/temp/John1 /home/j/john/save D. mv /home/j/john/save/john1 /home/j/john/temp Answer: C Question: 399 After completing an installation of Linux, the technician is asked to document the current configuration and place this in a public location. The technician documented the following items: 1. Administrator contact information 2. System network settings 3. Application configuration 4. Installed components Which of the following did the technician fail to include? A. The root password B. Disk partitioning scheme C. Location of common system files D. Cost of replacement system components Answer: B Question: 400 A system technician needs to determine with hardware modules are loaded on a particular Linux server. Which of the following commands will perform this task? A. lsmod B. modules C. insmod -list D. modprobe -list Answer: A Question: 401 Which of the following is the best way to change video resolution from 800x600 to 1024x768? A. Run xf86config to change the resolution. B. Reinstall Linux with more options for X Server. C. Reinstall X Server with support for the 1024x768 resolution. D. Restart X Server after typing "resolution=1024x768" as root.

Page 145 of 217

168. IV and V only Answer: A Question: 405 A user typed the following command on a machine: ifconfig eth0:1 192.155.168. I.155. The ppp_auth kernel module is not loaded.155. 53 C. and IV only B. but the password in the configuration file on the client system is correct.168. It will assign 192.5. Page 146 of 217 . Use ifconfig to enable the network interface using the new IP address III. 25 B. B.5 to eth0 as a second IP address C. II. I. Use ifconfig to disable the network interface II. The log files indicate tat an "Authentication failed" error occurred. I.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 402 A user tries to dial into his ISP. Update the arp table with the new address IV.168. C.5 up What would be the effect of typing this on a machine that already has an address of 192. I. The wrong authentication protocol was used by PPP. 110 Answer: D Question: 404 Below is a list of possible steps to take in order to change manually from the old IP address to new IP address of a computer. I. II. It will replace the current IP address with 192. and IV only D. but loses the connection after a few seconds. II and V only C.5. Answer: D Question: 403 What port is commonly used by the POP3 protocol? A. B. The modem dials and connects. Update the routing table with the new paths V. III.168. It will replace the old broadcast address with 192. D. Use insmod to insert a new driver Which of the steps are required? A.1 assigned to eth0? A.155. The user dialed the wrong phone number. Which of the following is most likely to be the problem? A. 69 D.155. The phone line is bad.

date 020315002002 B.168. time 0300:02:03:2002 D.03. /boot/info D. February 3.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. dateset 020320021500 C. /etc/fstab C.conf Answer: C Question: 410 If a video card is not recognized by the X configuration utility during the installation process. /etc/inetd. It will assign the address of 192. POP. /etc/profile C. XF86Config B. Identify the chipset on the video card and obtain the driver from the manufacturer.conf D. /ets/inittab C.5 to the second physical Ethernet card. /etc/inittab Answer: B Question: 407 Which of the following commands will set the current system time to 3:00 PM.155. /dev/info B. 2002? A. which of the following actions should be taken to enable X to display after installation is complete? A. Answer: B Question: 406 Which of the following files includes device names. Inspect the CMOS for information on the video card and install the drivers that came with the video card. mount points.02. /etc/vconsole Answer: C Question: 409 Which file can be edited to disable FTP.2002 Answer: A Question: 408 Which of the following is a configuration file that contains the system virtual console specifications? A. timeset 1500. /etc/inittab D. permissions and information about whether to mount the device at boot time? A. /etc/ports B. /etc/remote. Page 147 of 217 . filesystem types. and RSH services? A. C. Edit the /etc/inittab to boot the X Window System B.

Edit /etc/lilo. between GRUB and LILO? A. lpc C. Answer: C Question: 412 Which of the following commands is used to cancel print jobs? A. Reboot the machine Page 148 of 217 . cat /var/log/syslog Answer: A Question: 415 A Linux system is used for various Internet services and remote user access. The proxy server is not responding. D. C. LILO does not support hard drives larger than 30 GB. Answer: B Question: 411 What is the main difference. D. B. GRUB does not support passing of kernel boot options. Which service needs to be restarted and why? A. lpq B. GRUB does not have to be rewritten to the hard drive after changing the configuration file. dmesg B. tail sysinfo C. BIND. The WAN Web Servers are not responding Answer: B Question: 414 Which of the following commands can be run to gather specific information regarding the hardware in the system? A. if any. There is none. Samba. cat /var/log/spool D. B. which of the following actions is the LEAST likely to disrupt other services on that machine? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. lpr D. C. while a ping to a known WAN IP address is successful. HTTPD. Squid. nslookup on a popular known site produces the following error: "Host/domain not found". When a problem arises with one of the machine's services. Name resolution is not taking place. Kill a daemon B. lprm Answer: D Question: 413 Users contact the administrator and complains that they are unable to browse the Web. The file server is not responding.conf to include a boot message to the kernel pointing to the location of the video drivers.

. the problem is not corrected. ssh_config B. /root/. he is sure that he has entered his password correctly. which of the following commands should be used to permit IP addresses to be assigned? A. Boot into single-user mode and run fsck. Page 149 of 217 . pam_deny. Change his password. -c Answer: B Question: 419 The Linux system is not assigning IP addresses to client systems. What is the first thing to do to troubleshoot this situation? A.ssh/allowed_connections Answer: C Question: 418 tar automatically compresses and decompresses using which of the following options? A. z C. After the system is booted up. B. Change to runlevel 1 D. it hangs with file system corruption messages. All others can connect via ssh./dhspd start B. Answer: B Question: 417 A system will not allow root to ssh into the system. Disable a network device Answer: A Question: 416 A user calls into the support line and reports that he is unable to unlock his desktop.leases D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. touch dhcpd. Check if he has a valid password. After several attempts. Which of the following configuration files should be edited to permit connection as the root user? A. sshd_config D. . Check to see if <Caps Lock> is on./dhcpd restart C. After changing to the correct directory. Check to see if his account is active. After a reboot and executing the command "dhcpd start".so C. C. chkconfig --level 3 dhcpd on Answer: C Question: 420 The Linux system has experienced a power failure. c B. /z D. D. What is the best way to resolve this? A.

C. Boot DOS with a boot diskette and type "lilo" D. -help Answer: B Question: 422 While attempting to start an application in an X Window System environment. Boot Linux with a boot diskette and type "lilo" Answer: D Question: 424 Which of the following commands is most useful to determine whether an Ethernet card problem is caused by hardware or the Linux kernel? A. Boot into single-user mode and run mdrecoveryd. --man D. -h C. B. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. Answer: A Question: 421 Which of the following is a common switch used to display command syntax for most programs? A. Boot into multi-user mode and run "/sbin/shutdown -t3 -r now". the following error occurs: Error: Can't open display What most likely led to this error? A. D. Answer: D Question: 423 Which of the following would correct a corrupt master boot record and allow a clean boot into Linux? A. Boot into multi-user mode and run chkdsk. It is the wrong version of the application. The application was compiled with the wrong graphics library. D. Boot Linux and type "fdisk /MBR" B. dmesg and ifconfig D. /? B. The administrator has used "su -" to log into the current account. init and ps B. kupdate and mprobe Answer: C Question: 425 Page 150 of 217 . The application is not an X application. Boot any OS and type "fdisk /MBR" C. route and ping C.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A system is configured to dual-boot Linux with another operating system that is located on /dev/hda1. LILO is the choosen boot manager. The system reboots without access to the other operating system. What lines should be added to lilo.conf to allow access to the other operating system? A. table = LILO label = <shortened name of operating system> other = /dev/hda B. O/S = <shortened name of operating system> location = /dev/hda1 bootmgr = LILO C. label = /dev/hda1 table = /dev/had other = <shortened name of operating system> D. other = /dev/hda1 label = <shortened name of operating system> table = /dev/hda Answer: D Question: 426 "netstat -i" is typed at the command line. All of the following information will be displayed EXCEPT A. Transmission errors for each network interface B. The number of packets dropped for each network interface C. The number of packets received for each network interface D. A list of masqueraded connections for each network interface Answer: D Question: 427 Which of the following commands would be used to watch the mail log for errors? A. locate B. tail -f C. monitor -f D. cat mail.log Answer: B Question: 428 Linux is being installed on a system that uses SCSI hardware. During partitioning, an error is produced that says there are no valid devices found on which to install partitions. The hard drive spins up. The SCSI controller is functioning properly and supported by Linux. The cable is a known good cable and there is proper termination. What is the problem? A. The SCSI hard drive is not jumpered to the proper SCSI ID. B. The SCSI controller needs to be reset to factory defaults. C. The SCSI controller on the hard drive needs a firmware update. D. The SCSI controller on the hard drive has an intermittent problem. Answer: A

Page 151 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 429 What command is used to access the information about memory availability and usage in Linux? A. cat /dev/meminfo B. cat /var/log/mem C. cat /proc/meminfo D. cat /etc/memory/usage Answer: C Question: 430 A customer has installed a new hard drive on a Linux system. What would be the order of tasks to allow her to put her MP3 collection on the new drive? A. fsck,mount,mkfs B. mount,mkfs,chkfs C. cfdir,mkfs,mount D. mkfs,mount,fschk,cp Answer: C Question: 431 A system administrator complains that a user's system has been forwarding unsolicited email (spam) to mass email lists. Which of the following actions needs to be done to sendmail to stop the spam? A. Change the firewall rules. B. Restart the sendmail daemon. C. Restrict relay domains in the sendmail configuration. D. Change the SMTP mail server in the sendmail configuration. Answer: C Question: 432 What is the purpose of cron? A. Manage incoming and outgoing mail B. Runs specified commands at defined times C. Sets the system clock to a specified time D. Changes the permission settings on a file or directory Answer: B Question: 433 Which command will extract the file "backup-4-19-2001.tgz"? A. unzip backup-4-19-2001.tgz B. tar xf backup-4-19-2001.tgz C. tar xzf backup-4-19-2001.tgz D. uncompress backup-4-19-2001.tgz Answer: C Question: 434

Page 152 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A user calls the help desk, complaining that upon issuing a command to list files in her home directory, a "permission denied" error is received. Which of the following actions should be taken to resolv the problem? A. Delete the user's home directory and re-create it. B. Ask the user for some patience while the server is rebooted. C. Run "chmod 007" on the user's home directory and have the user try again. D. Check the UID:GID of the user's home directory and change it if necessary. Answer: D Question: 435 Which of the following types of backup minimizes system downtime during restore? A. FDD backup B. Full backup C. Incremental backup D. Differential Backup Answer: B Question: 436 A system administrator routinely needs to see the list of who has logged in and out on a machine, as well as their login times. Which of the following commands searches the "/var/log/wtmp" file and displays who has logged onto the machine and when they logged on? A. who B. last C. log -l D. wtmplst Answer: B Question: 437 A user who wants the status listing of all network interfaces will use which of the following commands to obtain this information? A. ifconfig -a B. ifconfig up C. ifconfig eth* D. ifconfig --all Answer: A Question: 438 A Linux superuser is unable to delete a file. The user is also unable to change permission for the file. What is the problem? A. The file is actually a hard link. B. The file has the immutable flag set. C. The file has been fragmented across directories. D. The superuser does not have permission to access the file. Answer: B
Page 153 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 439 Which of the following packages helps to identify a bad password? A. CERT B. Hack C. Crack D. Tiger Answer: C Question: 440 Which of the following commands will list all rpm packages installed on the system? A. rpm -d B. rpm -i C. rpm -qa D. rpm -Uvh Answer: C Question: 441 The system technicians and administrators at a facility are poor at keeping maintenance records up-to-date. The administrator decides to keep only the minimum information in the records and require that it be updated. Which of the following information is the most important to maintain? A. Dates and times that the server was rebooted B. Version numbers of patches applied to services C. Information about new users added to the system D. Records of which administrators have logged in to the system Answer: B Question: 442 The system administrator needs to examine the processes that the user with the login of 'john' currently owns. Which of the following commands would best do this? A. ps john B. ps -r john C. ps -U john D. ps -all | grep john Answer: C Question: 443 What Linux service is responsible for successfully sharing files over a NetBios network? A. NFS B. Samba C. XFree86 D. Xwindows Answer: B Question: 444
Page 154 of 217

TCP/IP B. It is a test version of the kernel. B. It is not the most recent kernel available. There are no differences between ext2 and ReiserFS. Use the kernel editor to vierify there is a SCSI module installed for the controller. D. The customer wants a system that will prevent unauthorized intrusion from outside his network. This version of the Linux kernel has a known problem with Apache.3. Web Server C. B. Use the Linux distribution Hardware Compability List to verify that the controller is supported. Firewall B. C. It needs to be upgraded to Kernetl 2. Which of the following protocols should be installed on the Linux workstation? A. The SCSI controller manufacturer is out of business. Database Server D.12). NetBIOS C. C.3. D. ReiserFS has built-in USB file system support. Use the man pages to verify there is a SCSI module available for the controller. ext2 allows only 8 character file names. Answer: B Question: 448 A Linux workstation is being integrated into a network that uses older Novell Netware servers (version 2. ReiserFS allows partitions to be journaled. Verify that SCSI emulation is activated in the kernel. B. What should be done to verify that the SCSI controller will work with Linux? A.20 for network support. What is the most likely reason for this choice? A. the customer decided to use the ReiserFS file system rather than ext2.19-2 be an INAPPROPRIATE kernel for a production web server? A. Answer: B Question: 446 A customer is concerned about attacks to his network from the Internet. What type of server does the customer require? A. Apple Talk Page 155 of 217 .2 and 3. Answer: A Question: 445 A customer wants to upgrade an old UNIX server to a current version of a Linux OS. D. IPX/SPX D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Why would Kernel 2. C. System Management Server Answer: A Question: 447 During installation of a Linux system. The workstations use only the Netware client software to communicate with the server and to share data.

Validate that kernel. what command should be issued? A. What caused this error message? A. install Answer: C Question: 451 The system administrator has just completed the installation and configuration of a DNS server to be used for external name resolution. Validate that the /boot directory exists D. After editing the necessary configuration files. /etc/lilo B. Run "verify <package_name>" B. rpm C. Ping an external IP address. D. B. Get a Web page from within the local area network. A device being installed is not functioning and must be replaced. A module is corrupted and must e reinstalled B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 449 A customer has recompiled his kernel to a new image including new modules. Run traceroute to the DNS server and analyze the hops. /sbin/loadlin D. The DNS service need to be validated before bringing the server into production. The installation is corrupt and must be reinstalled C. C. run B./start kernel Answer: B Question: 450 What command is commonly issued to compile and install an application from its source code? A. /sbin/lilo C. make D. GRUB is not being used as the boot loader. What would be the best method to validate the proper operation of the service? A. Answer: C Question: 452 A package that a user installed has never run successfully and returns a large number of errors.lib is the correct version Answer: C Question: 453 An error message appears that states that no modular support is available. Page 156 of 217 . What is the first action that should be taken? A. Run the dig command for an external domain name. . Run "rpm --verify <package_name>" C.

The maximum password length is now 64 characters. 76range D. xpF57se B. Proxy Server D.mount/dev/hde1 /mntlusb Page 157 of 217 . D. fdisk /dev/sdb D. Access to /etc/passwd is now limited to root.mount -t usbfs /dev/usb001 /mnt/usb C . B.mount/dev/uda1 /mnt/usb D . Answer: D Question: 456 Which of the following passwords would be the most secure? A. the technician enabled Shadow Passwords and MD5 Passwords.net Question: 455 During installation of a new server. fdisk /dev/hd2 C. User passwords are now kept in the /etc/shadow file. C. LasVegas Answer: A Question: 457 Which of the following packages is usually more important for a "workstation" installation than a "server" installation? A. DHCP Server C. Answer: Pending. NFS has now been disabled. DNS Server B. Send your suggestions at feedback@Examsheets. The kernel does not support loadable modules and must be recompiled.mount/dev/sda1 /mnt/usb B . Which of the following commands must be run to partition the disk? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Send your suggestions at feedback@Examsheets.net Question: 454 The user installs the second SCSI hard drive into the computer and needs to partition it. XFree86 Server Answer: D Question: 458 Which of the following commands will mount a USB flash drive successfully in Linux? A . What changes have been made on the server? A. range76 C. fdisk /dev/hdb B. fdisk /dev/sd2 Answer: Pending.

The server is now generating I/O errors when the kernel module for the network card is loaded.NTLMv2 Answer: B Question: 461 If /etc/syslog.The events logged by a program called ail? C .Change the server BIOS setting to disable the network card BIOS.tar --checksum Answer: A Question: 463 A user wants to know how to set up SSH (Secure Shell) to communicate between systems without requiring passwords. Answer: C Question: 462 Which of the following commands can be used to check for file corruption? A .cat-vet C .Disable passwords on specific accounts that will use SSH.The events generated by a user called ail? B .Move the network card to another available slot. D .3DES C . C . B .checkfile D .md5sum B . B .RC2 B .log Which of the following log events will this line cause to be logged to mail. Answer: B Question: 460 Which of the following is supported when creating a Linux VPN (Virtual Private Network)? A .The events logged to the mail facility at any priority. Which of the following actions will solve the problem? A . Which of the following is the BEST way to accomplish this? A .Disable the power management in the BIOS.* -iVar/log/mail.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 459 A technician added a PCI network card to a stable Linux server. D .Reconfigure the network card to use a different IP address. Page 158 of 217 .The events logged from any host that begins with the name mail.log? A .chap D .conf has the following entry: mail.Use ssh-keygen to generate public-private keys.

dhcpcd and rexec C .PCMCIA cards Answer: D Question: 465 Alter an upgrade of Apache.conf B .PCI cards B .xinetd. Which of the following files should be edited or replaced to correct the problem? A .PXE (Preboot execution Environment) and tftpd Answer: D Question: 468 x iptables table? A .iptables-L B .ifconfig Answer: B Question: 467 Which of the following services needs to be installed on a server to support new diskless client workstations? A .srm.arp B .iptables --delete Page 159 of 217 .named and httpd B .Use RSH (Remote Shell) rather than SSH because it does not require passwords./etc/services Answer: B Question: 466 Which of the following is a common tool used to determine what services and ports are running on a remote Linux box? A .iptables-F D .SCSI cards D . D .netstat D . Web pages are no longer available and are replaced with a default page.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .conf C .httpd.conf D .iptables-A C .remoted and dhcpd D .nmap C .USB cards C .Add systems that do not need passwords to the /etc/ssh. Answer: A Question: 464 Which of the following configurations does cardmgr read at startup on a Linux system? A .hosts file.

Edit lilo. How should this be accomplished? A .120 Answer: C Question: 472 Which of the following allows for secure remote command line access? A .80 C .POST C . Which of the following commands can be used to see what processor was detected on boot? A . Using the is command.SSL C .Edit IiIo.conf and run “lilo -v-v” C .Telnet D .Rlogin Answer: A Question: 473 A technician created a new directory for use by a user “User12”.proc B . How much usable storage space is available? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 469 A user complained that a laptop system seems slow.Run “lilo -o /dev/hda” B .100 D .Set LILO=/dev/hda and then run “lilocont /dev/hda” Answer: B Question: 471 A Linux system is configured with a RAID 5 array consisting of six 20GB hard drives.50 B .cpuinfo Answer: C Question: 470 The LILO boot configuration needs to be updated to support a new IDE hard drive that was installed. the technician observes the following: drwxr-xr-x 2 root root 4096 May 24 1 3:11 dirname Which of the following is the BEST way to enable User12 to use the directory without letting other users manipulate its content? Page 160 of 217 . User12 is unable to create new files or subdirectories within this new directory.dmesg D .SSH (Secure Shell) B .conf and run “liloconf -v –v” D .

168.1.255.0 C .0.chmod 700 dirname B ..chown User12:User12 dirname Answer: D Question: 474 Which of the following files contains the key or keys required to login using SSH (Secure Shell) without a password? A .ifconfig eth2 192.255.ATM B .1.255.PPPoE Answer: D Question: 477 Which of the following services commonly uses Port 22? A .1.ifconfig eth2 192.1.ifconfig eth1 192..Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .DNS C .SMTP Answer: C Question: 478 A Linux technician accessed the Web server on http://1 27.168.1.15 netmask 255.15/24 to the second NIC (Network Interface Card) in a workstation? A .chown dirname User12 C . Where can the technician find detailed messages about this problem? Page 161 of 217 .ssh/trusted_keys C .15 netmask 255. and received a orbidden message.255.ssh/allowed_keys D .ifconfig eth1 192.0 D .15 subnet 255.255.255.0 B .0 Answer: C Question: 476 Which of the following protocols is used while configuring a Linux workstation to use a connection via a DSL modem? A .15 subnet 255..168.chgrp User12 dirname D .ssh/authorized_keys Answer: D Question: 475 Which of the following itconfig commands can be used to assign the P address 192.255.168.0.ATM B .ssh/known_keys B .SSH (Secure Shell) D .PPTP D .255.1 with a default install of Apache.168..SLIP C .

but still can execute other commands while the ‘find’ command is searching for the file? A .In an office.httpd_log C .In a predetermined secure location on-site.dig comptia.org D .find filename> background Answer: C Question: 483 Page 162 of 217 . securely stored in an area located near the server B .mailtest comptia.FILES D . located in a secure off-site facility D . but not in the server room C .access_log D . to be tiled and labeled appropriately with the rest of the system documentation Answer: A Question: 480 Which of the following environment variables specifies the location where user files are stored by default? A .find / -name filename C .HOME C .apache_log Answer: A Question: 479 After the Linux technician has completed the server configuration documentation.org C .dig -t ms comptia org Answer: C Question: 482 Which of the following commands is used to search the whole directory structure to locate a specific file.find / -name filename & D . according to best practice? A .find / filename & B .error_log B .SHELL Answer: B Question: 481 A company’s mail server is unable to send mail to the domain comptia. where should this documentation be stored.In a binder.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .org.org B .PATH B . Which of the following commands might help determine if their DNS records are correct? A .In an approved tire-proof container.dig -t mx comptia.

Read and execute permissions to root.Edit the /etc/sysctl.Silicon Graphics MIPS processor Answer: C Question: 487 In which subdirectory of the Apache root should scripts be placed? A . Which of the following commands should the network administrator have issued? A .IBM PowerPC processor C . and read-only permission to the group.Intel Pentium lll processor D . Which method is considered best practice? A .HP Alpha processor B . IP forwarding is not working. Only the database server must be allowed to print.3-100.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A file with permission set to octet 540 allows which of the following? A. Read and write permissions to root.bin B .htbin Page 163 of 217 . Answer: D Question: 484 A network administrator has enabled lP forwarding on a Linux server with the following command: echo “1” > /proc/sys/net/ipv4/ip_forward After the server is restarted several weeks later.Limit file permissions on the spool directory to users on the database server Answer: A Question: 486 Which of the following processors would be fully supported by glibc-2.Run save proc B .Restart the network daemon C . Read and write permissions to the owner. and read-only permission to the group. and read-only permission to the group. No permission to others.i86.conf file D . D.Edit /etc/hosts.lpd to only include the database server B . No permission to others.Limit file permissions on the printer filter to users on the database server D . B.Edit /etc/printcap and add a filter to only include the database server C . No permission to others. C. Read and execute permissions to the owner.rpm? A .5. No permission to others. and read-only permission to the group.Run echo “1” > /proc/sys/net/ipv4/ip_forward –save Answer: C Question: 485 A Linux print server must limit access to its printers.

tail -v /var/log/messages C . D .tail -r /var/log/messages D . B .allow Answer: D Question: 492 A user has a cron job that clears print queues at midnight each day.first /var/log/boot.tail -f /var/log/messages Answer: D Question: 491 Which of the following files should be edited to provide static name to lP address mapping? A .Check to make sure the printer is connected to the server and powered on.conf C .NTFS Answer: B Question: 490 Which of the following commands should be used to monitor system logs in real time? A . however the job apparently did not run the night before.tail /var/log/boot./etc/hosts.HFS (Hierarchical File System) D .log Answer: B Question: 489 Which of the following types of partitions can be used to provide a reliable shared partition on a dual-boot system with Linux and Windows 96? A .Check to make sure the user was properly logged into the network the night before.htdocs D .log B .cgi-bin Answer: D Question: 488 Which of the following commands can be used to view the first 10 lines of the bootlog file? A . C ./etc/resolv.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .head /var/log/boot.tail -s /var/log/messages B . The cron job has run correctly for several months. Page 164 of 217 . Which of the following should be done FIRST to resolve the problem? A .log D ./etc/hosts B .log C .cont D ./etc/host.FAT C .top /var/log/boot.Check the process list for an instance of crond running.Ext2 B .Checkthe user’s cron job for syntax errors and correct as needed.

C .dmesg | grepeth C .It stops bruteforcing attempts on the root account over the network.shell B .chown 2755 filename D . a user wants to find out if the card was detected properly at boot. B .It restricts sudoers who can su to root.AES B .uname-s Answer: C Question: 497 Root logins should NOT be allowed over the network for which of the following reasons? A . Answer: C Page 165 of 217 .It creates accountability by writing all “su” attempts to a su log.SHA D .It prevents the system from being rebooted remotely.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 493 Which of the following commands sets the permissions of a file to the following? -rwsr-sr-x A .MD5 C .change 4755 filename Answer: A Question: 494 Which of the following is a reversible encryption standard? A .MD4 Answer: A Question: 495 After replacing the network card in a Linux machine.hwstat | grepeth D .chmod 1755 filename C . D . Which of the following commands will provide this information? A .echo $SHELL D .cat /proc/net | grep eth Answer: B Question: 496 Which of the following commands displays the name of the current shell? A .chmod 6755 filename B .cat/proc/shell C .ls-l/dev/eth* B .

/dev/hdb1 /mntlhdb1 ext3 defaults./dev/hda1 /proc/hda1 ntfs defaults.~/. noatime.Run http -Im perl _module from the command line. noatime./bin/false C . Answer: D Question: 500 Which of the following is a valid entry for /etc/fstab? A./bin/sh B .conf file.conf C .conf file.Web browser kiosk B . notail 0 0 B ./etc/pam./bin/passwd D .Thin client workstation C .bashrc D . The administrator wants to do this by adding pen_module to the Apache configuration./bin/disable Page 166 of 217 .so in httpd. C . Which of the following is the appropriate shell to set? A .noatime./dev/hd1 /mnt/hda1l ntfs defaults./etc/logon.Remove the # from #LoadModule perl_module libexec/httpd/libssl. The manager has asked that users have restricted time periods in which they can login.notail 0 0 Answer: B Question: 501 Which of the following Linux systems would MOST likely be without a monitor and keyboard? A . notail 0 0 D ./dev/hdb1 /mnt/hdb1 reiser defaults.noatime. How can this be done? A . notail 0 0 C .so in httpd. D .conf B . Which of the following must be edited to accomplish this? A .Remove the #from #AddModule perl_module libexec/httpd/libssl.Database server appliance D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 498 A set of computers is used for technical support./etc/group Answer: A Question: 499 An administrator needs to add support for PERL to Apache for the company’s Website.Run httpd --module perl_module from the command line. B .Portable network traffic analyzer Answer: C Question: 502 A system administrator wants to disable shell access ror a user.

5” diskette drive. Which of the following is the BEST way to complete the installation? A .The fourth field Answer: B Question: 506 The UMASK value is set to 22.The third field D . Which of the following will the default permissions be on lilename.The system has been compromised.Only root has shared access for ksh. B . B .r-xr-wr-w B . D .The firstfield B .ksh was inadvertently installed in user’s directory.Install via TFTP (Trivial File Transfer Protocol) from the network.The second field C .rw-r--rAnswer: D Page 167 of 217 .Install via FTP from an FTP server C .The ksh service needs to be restarted.rwxr-xr-x D .Install via NFS (Network File Server) from a Web server. Answer: B Question: 505 Examine the following /etc/passwd file: root:X:1423:0:99999:7::: dgringold:X:11423:0:99999:7::: jjones: !!:11432:0:99999:7:: 11688: tgold:!!:11342:11231:11678:7::: Which of the following is the password field? A .----w--W C .txt when the file is created? A . C .Copy the CD-ROM files to the machine using the 3. Answer: A Question: 504 An administrator wants to install Linux onto a computer that does not have a CD-ROM drive. D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 503 The system administrator notices the following file in a user’s home directory: -rwsr-xr-x 1 root userl 628684 Jun 1309:38 ksh Which of the following does this file indicate? A .

txt How many hard links have been created to this file? A-0 B-4 C-5 D-6 Answer: B Question: 508 Which of the following is an IDS (Intrusion Detection System)? A .mount-t vfs /dev/sdb2 Answer: A Page 168 of 217 .sfdisk/dev/sdb2 D .startand and stop D .Ipr B .Snort C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 507 The output of an “ls .enable and disable Answer: D Question: 511 A server requires more swap space. which of the following commands is used to activate the new partition? A .Change the $PS1 variable in ~/.SSH (Secure Shell) B .cshrc B .mkfs-swap C .Change the $PROMPT variable in ~/.profile Answer: B Question: 510 Which of the following commands can be used to start and stop printers and classes? A .Change the $PPOMPT variable in ~/. A new swap partition is created at /dev/sdb2 using fdisk.cshrc D .profile C .Change the $PS1 variable in ~ /.swapon-a B .Iprm C . After editing the configuration.openssl D .ethereal Answer: B Question: 509 How can a user change their default BASH shell prompt? A .la” is the following: -rw-r-xrwx 5 root root 4096 Apr 20 10:03 file.

Answer: D Question: 516 Which runlevel would be used to repair a system and grant access to the root user only? A-0 B-1 C-2 D-6 Answer: B Question: 517 An administrator types the command s xl and the following is a portion of the output obtained: Page 169 of 217 ./tmp requires a lot of space./tmp file system is cleared alter every reboot. C .wall -s ‘Our Aliases’ > /etc/aliases B . B .postfix someone@localhost -s ‘Our Aliases’ </etc/aliases D .MD5 B ./var/filesystems C .mail someone@localhost -s ‘Our Aliases’ </etc/aliases C . D .Blowfish D ./dev/filesystems D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 512 Which of the following is a secure authentication method? A ./etc/filesystems B .sendmail someone@localhost -s ‘Our Aliases’ > /etc/aliases Answer: B Question: 514 Which of the following files contains a list of file systems that can be currently mounted on the system if all supported modules have been loaded? A .RC5 C ./proc/filesystems Answer: D Question: 515 Why should “/tmp” be located on a separate partition from the “/” file system? A ./tmp is used to simulate RAM./tmp could become full and fill up the root file system.Kerberos Answer: D Question: 513 How would a user send/etc/aliases as the text of an email to another user on the same system? A .

/etc/passwd Answer: B Question: 520 A Linux administrator just installed Xfree86./etc/inittab B .rpm -F /mnt/cdrom/RPMS/*./etc/users D ./usr/group B ./etc/runlevels C .rpm --update /mnt/cdrom/RPMS/*./etc/defaultrunlevel Answer: A Page 170 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which process number should be killed to stop the map?and term?processes? A .1707 D .sysinit D .rpm C . Which of the following files should the administrator edit in order to change the default system runlevel from 3 to 5 ? A ./etc/rc.rpm Answer: A Question: 519 Which of the following Linux files is used to assign users to groups? A .rpm -i /mnt/cdrom/RPMS/*.rpm D .rpm -update /mnt/cdrom/RPMS/*.15 B .820 C ./etc/group C . Which of the following is the BEST command to use to update all of the existing RPMS on a server without making any other changes? A .rpm B .1921 Answer: C Question: 518 An update CD-ROM for a distribution contains the latest RPMs for all packages that they provide.

Reconfigure the wireless access point to access Linux connections. C .gtarzcvf backup.tar-Zxvf backup.All directories B .* | gunzip> backup .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 521 A user has added a PCMCIA wireless network card to a Linux laptop.tgz Answer: A Question: 523 A Linux server is configured as a router.*’ A . After boot. but the administrator notices that packets are no longer being routed.All hidden files C ./etc/rc.cat/proc/self/status B .Check that the PCMCIA ports are enabled in the BIOS.All files created today Page 171 of 217 .cat /proc/sys/net/ipv4/ip_forward Answer: D Question: 524 A user who has a file open in vi wants to search for the next occurrence of the word ‘coexistence’.-. The network services tail on boot. Answer: C Question: 522 Which of the following commands can be used to back up all the files in the current directory and compress them? A ./coexistence B . network services load properly.d/squid status C .tgz * B .tgz * D . Which of the following could solve the problem? A .s/coexistence D .tar -cvf . if they are restarted by hand. Which of the following should the administrator run on the server to verify routing functionality? A ./etc/rc..f coexistence C .Check the order of execution of services in the boot scripts.Reinstall the wireless network card drivers on the system. Which of the following commands will accomplish this from within the editor’s command mode? A . B .All files created in / D .find_forward coexistence Answer: A Question: 525 The following command run as root will search the system for which of the following? find /-name ‘.tgz * C .d/network status D ..tar zcvf backup. D .

Makefile B .mount /dev/fd0 /mnt/floppy mkdosfs /dev/fd0 B . the hard drive performance significantly decreases. The diskette is unformatted. Answer: C Question: 528 If the command below is executed in a user’s home directory.Sends the message ‘hello’ to all currently logged in users.Sends the message ‘hello’ to all users on the system.Verify that the hard drive has been formatted.mkfs -text2 /dev/fd0 mount /dev/fd0 /mnt/floppy C . Answer: D Question: 527 When a Linux laptop runs on battery. C . C . B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 526 Which of the following is the FIRST step that should be taken prior to installing Linux on new hardware? A . Answer: D Question: 529 Which of the following files is commonly included with source code to automate the compilation? A .Decrease the APM (Advanced Power Management) value for the hard drive.Autorun C . D .Creates a new file called ‘hello’ and sends itto all users.Increase the amount of swap space on the disk. D . B . Which of the following can improve the hard drive performance? A .mount /dev/fd0/mnt/floppy mkfs-t msdos/dev/fd0 D .so Answer: A Question: 530 A technician needs to create a diskette to transfer data from a Linux server to a Windows 2000 server.Run the sysprep utility from the Linux vendor’s CD. Which of the following commands should be used to prepare the diskette for writing? A .README.Decrease the amount of swap space on the disk.mkdosfs /dev/fd0 mount -t msdos /dev/fd0 /mnt/floppy Page 172 of 217 .Auto. which of the following would be accomplished? echo hello>> allusers A . D .Review the HCL (Hardware Compatibility List) on the Linux distributor’s Website. B .Appends ‘hello’ to the end of the file llusers? if it exists.config D .Increase the APM (Advanced Power Management) value for the hard drive. C .Download all appropriate device drivers from the Linux vendors Website.

rtelnetd Answer: C Question: 532 A user complains that the mount point the system uses for the CD-ROM device is too long. DNS.Make the user a member of the operator group Page 173 of 217 . Which of the following commands will remove the user from the system and maintain the contents of the employee’s home directory? A . C .NIS requests are forwarded to DNS. How can the user be given this privilege without the root password? A ./etc/mtab B ./etc/exports Answer: B Question: 533 An employee has been terminated from the company. NetBIOS. The user wants to change the mount point from /media/cdrom to /cdrom. what does the following line do? ~ hosts: nis files dns A .sshd C . D .rsh B . Answer: B Question: 535 A user needs the ability to create new users on a system. and remote files.userdel B . and DNS lookups.passwd -l C ./etc/fstab C .Edit the /etc/sysconfig/policies file C .xinetd D .NIS is used first for hostname resolution./etc/hosts is used for all NIS.conf.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D Question: 531 Which of the following packages is used to implement Telnet services on major Linux distributions? A .userdel -r Answer: A Question: 534 In the file /etc/nsswitch. B .usermod -f D .Add the user to the /etc/sudoers file B . Which of the following files needs to be edited? A .NSS (Network Security Services) lookup is enabled for NIS./etc/mount D .

d/cups restart Answer: D Question: 537 A Linux technician is preparing to install a 64-bit Ultra 320 SCSI PCI controller on a x86 system.lp restart B .64 bit PCl slot B ./etc/init./usr/local/doc Answer: C Question: 539 Which of the following files is used to specify drives to be mounted on boot? A .64 bit processor D . groupadd.Optical Recordable Page 174 of 217 .SCSI C ./documents C .nfs B .cups restart C .Tape D .NVRAM B .d/ lp restart D .Grant the user execute privileges to useradd.64 bit diskette C . Which of the following is the MOST likely place to find the documentation? A . which of the following commands can be used to restart the printing module? A .d Answer: C Question: 540 Which of the following is the economical choice for high capacity off-site archiving? A ./etc/init.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D . Which of the following must the system have to allow this to work at full functionality? A ./etc/doc B .fstab D .mtab C . and usermod Answer: A Question: 536 After a printer is removed from a Linux workstation./usr/share/doc D .inet.64 bit memory path Answer: A Question: 538 The user would like to find documentation files of an installed package.

tar xvf package. D .155.bz2” from the vendor.The sound card is not on the HCL (Hardware Compatibility List).tar.bz2 | bzip2 -d C .The ALSA (Advanced Linux Sound Architecture) sound server was not started.xmodmap D .tar.tar.The sound module was not added to the kernel. Which of the following commands can be used to do this? A .lsmod B .5 up Which of the following is the effect of typing this on a machine that already has an address of 192.bz2 | tar xvf D .tar.netstat Answer: A Question: 543 After properly installing both the sound card and modules.keyboard Answer: C Question: 542 Which of the following is the BEST tool to measure system performance baseline over a period of time? A . B .bzip2 -d < package.tar | tar xvf package. but no sound was heard. Which of the following command lines can be used to extract the contents of the package? A . C .pmap D . Answer: D Question: 544 A user downloads the software package “package .1 assigned to eth0? Page 175 of 217 .var C .155.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 541 A Linux system has been installed using Chinese.The sound card does not support MP3 playback.bz2 B .sar B .bz2 Answer: C Question: 545 A user typed the following command on a machine: ifconfig eth0:1 192.160.tar. The system administrator has been asked to change the language setting to English.depmod C . the technician attempted to play an MP3 file.160.bzip2 package. Which of the following is MOST likely to be the problem? A .tar xf package.

The account is expired.tripwire --status D .Hunt B . D .tripwire --check B .160.Users that may not log in using FTP Answer: D Question: 548 Which of the following packages helps to identify simple passwords? A .155.Jones used the wrong password.Crack Answer: D Question: 549 User jones’ cannot login to a Linux server.The gateway address will be replaced with 192. B . C .5.tripwire --monitor Answer: A Question: 547 Which of the following describes the contents of the file etc/ftpusers? A .Hosts that may not connect through FTP D .160.Hack C . which otthe rollowing cables should be used? Page 176 of 217 .The address of 192.155.tripwire --verify C .5. The technician checked the server records and noted that shadow passwords are disabled.160.The current IP address will be replaced with 192.155.The account is disabled.The account is using a service UID (User ID).gnupg D .5 will be assigned to the second physical NIC Answer: C Question: 546 Which of the following tripwire commands can be run to analyze the current status of the system? A .5 will be assigned to eth0 as a second IP address.192.155.Users that may log in using FTP B . Answer: B Question: 550 When an ATA-133 hard drive is installed. The technician also noted that /etc/passwd contains the following entry: jones:*:1001:300:Bob Jones:/home/jones:/bin/bash Which of the following is MOST likely to be the problem? A .Hosts that may connect through FTP C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . D .160. C . B .

mkfs B .1 owner owner5 Jun 13 12:14 A Which of the following should be checked next in order to diagnose this problem? A . The owner is able to delete other files in the directory. but all attempts by the owner of /home/owner/A to delete the one file result in the output bash: A: Permission denied Given the file listing: -rw-r--r-.cat/etc/passwd Answer: D Question: 552 The directory /home is on an ext2 file system.80 pin 80 wire D .mount -f ftape Page 177 of 217 .tcpdump ftape B .cat /etc/services C .chpasswd Answer: C Question: 554 A new tape drive has been added to a Linux system.80 pin 40 wire C .40 pin 80 wire B .uname B . GID (Group ID).cat/etc/group B .usermud D . full name.rm -r /home/owner D .68 pin 68 wire Answer: A Question: 551 Which of the following can be used to view username. home directory. Which of the following commands can be used to verify that the tape drive is operational? A .chfn C . UID (User ID).dmesg C . and default shell information? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .tar-xvf tape C .lsattr /home/owner/A Answer: D Question: 553 Which of the following commands could be used to set the number of days a user can maintain the same password? A .cat/etc/shadow D .

what part of the installation should be planned and documented? A . performance baseline D . required services.i2c-core Answer: B Question: 557 A system report indicates that /var is full. B . Which of the following daemons should the administrator verify is running? A .err B . user passwords B . Answer: A Question: 558 Users begin reporting that they receive ‘Unable to resolve hostname’ error messages. required services.Remove unnecessary applications that may be using too much disk space.power D .bind B . performance baseline Answer: B Question: 556 The company wants to have its laptops perform a clean shutdown of the Linux operating system when the power button is pressed.dmseg | grep ftape Answer: D Question: 555 Before performing a new Linux server installation.Partition map.dhcpd C . root password.Increase the allowable size of swap file. Which of the following modules must be installed to accomplish this? A . required packages. Which of the following is the MOST likely resolution to the problem? A .resolvd D .ACPI (Advanced Control and Power Intertace) C .System hardware.emerg Page 178 of 217 .crit C .Ensure that users have not exceeded disk quota. required packages.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .Truncate the log files. daemon configuration.Partition map. C . partition map C . D .APM (Advanced Power Management) B . partition map.named Answer: D Question: 559 Which of the following syslog keywords has the highest priority? A .System hardware. required packages.

/dev/hda B .BIND B . Which of the following commands would accomplish this? A ./dev/hdb C .Apache Page 179 of 217 .alert Answer: C Question: 560 Which of the following is necessary for a user to scan images from a flatbed scanner? A ./dev/sdb Answer: B Question: 564 A business wants to be able to track all Websites that are visited by its employees.iptables -A FORWARD -p udp --dport icmp -j DROP D .sane C .disable-smp C .block-cpu-1 D .nosmp B . Which of the following is the correct parameter to pass to the kernel at boot time? A .cops D .twain Answer: B Question: 561 For troubleshooting. a technician needs to boot an SMP (Symmetric Multi-Processor) system to use a single CPU./dev/sda D . Which of the following devices would be the target of the Linux partitioning? A .gimp B .enable_smp=no Answer: A Question: 562 The administrator wants to deny ICMP traffic from being forwarded.iptables -A FORWARD -p icmp -j DROP C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .iptables -A FORWARD -a all -proto ICMP -j REJECT Answer: B Question: 563 A user wants to install Linux as a dual-boot option on the second hard drive on the primary IDE controller.iptables -A FORWARD -p icmp -j DENY B .Samba C . Which or the following Linux packages would BEST serve this need? A .

set NEWSIZE=1000 B .Kerberos Answer: A Question: 568 Using the BASH shell.MPEG-2 capable camera Answer: C Question: 567 A Linux administrator is trying to set up a server that provides the MOST secure communication for remote administration.alias HISTORY=1000 D .systeminfo Page 180 of 217 . which of the following commands will set number of entries in the command history to 1000? A .export HISTSIZE=1000 Answer: D Question: 569 Which of the following commands will display a list of system hardware after the Linux system boots? A .Sound card C .MPEG-2 encoder D .proc B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .Xfree86 B .Squid Answer: D Question: 565 In which of the following runlevels is X Windows started by default A-2 B-3 C-5 D-6 Answer: C Question: 566 A technician is creating MPEG-2 video files in Linux.RSH (Remote Shell) C .dmesg D .POST C . Which of the following is the BEST choice for this situation? A .FreeRADIUS D .SSH (Secure Shell) B .setenv HSIZE=1000 C . which of the following multimedia components is also required? A . In addition to a video card with input source.

The SUID bit on this printer’s spool directory is not set.rpm on several desktop computers.rpm is already installed? A .True negatives C . Which of the following commands would determine if NewFonts. B . Answer: B Question: 571 A production Web server is experiencing an unusually large amount of new incoming TCP connections. Which of the following is MOST likely the problem? A . Answer: B Question: 574 An administrator wants to create a script that installs NewFonts.Too manyusers D .Users do not have execute permission on the print filter. The script should check if the RPM is already installed. C .Root does not have read permission on the print filter. D .Use a static IP address.False negatives Answer: C Question: 573 A Linux server is to be used as a Web server. Which of the following is the BEST way to configure its Ethernet adapter? A . B .NIC malfunction Answer: A Question: 572 The IDS (Intrusion Detection System) reports many events that are not security incidents.Virus C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 570 Users are unable to print to a remote printer on a Linux server.rpm-a NewFonts Page 181 of 217 .True positives B .DoS (Denial of Service) B .The /etc/printcap file is missing.False positives D . The technician determines that all of the users and machines have the right to print to the server. Which of the following is the term for these types of events? A . Which of the following is MOST likely the problem? A . The permissions on the printer’s spool directory are set to allow access to all users.Use an IP alias. C .Configure the DHCP Client. Users can print to other printers on the server.Configure the DHCP Server. D .

com administrator. Answer: A Question: 576 A user wants to derine a new Web space. Which of the following log files reveals this information? Page 182 of 217 .Change the default run level in /etc/inittab.com domain and would like to contact the example.Full access to the owner only Answer: B Question: 579 An administrator needs to check which users are utilizing the u command and when it is being utilized. D .Same as the target file B .NamedSiteEntry Answer: B Question: 577 The administrator notices malicious network traffic from the example.HeaderSite B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B .Edit the /etc/fstab file.ipuser Answer: A Question: 578 Which of the following are the default permissions for a symbolic link file? A . rather than by examining the port number of IP address.rpm --list NewFonts D .Full access to root only D .rpm --checksig NewFonts Answer: B Question: 575 A recent hard drive addition to a server has a problem: the administrator has to manually mount the drive every time the server is rebooted. Which of the following needs to be done in order to resolve this issue? A .Editthe/dev entry for the device.VirtualWebsite D .Full access to everyone C . Which of the following commands would display contact information for this domain? A .fuser C .VirtualHost C .Load a kernel module for the drive. C .whoip D . B . Which of the following directives can be used to accomplish this? A . The browser header will be examined by Apache to determine which Web space the client will be sent.rpm-q NewFonts C .whois B .

Which of the following files can be viewed to determine the source of the problem? A .com D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . The user suspects that the IDE drive may not be using DMA. Which of the following commands can be used to verify the hard drive connected on /dev/hda has DMA enabled? A ./var/log/lastlog D .makewhatis D .ssh --userjdoe4example.dmesg C .grep dma /proc/ide/hda/settings Answer: D Question: 584 Which of the following encryption algorithms are natively supported for the /etc/shadow file? Page 183 of 217 .sysinfo /dev/hda B .ssh jdoe4 example.com B .com C .grep dma /proc/hdinfo D .fdisk-l /dev/hda C .messages Answer: D Question: 582 Using SSH (Secure Shell).ssh example./var/log/messages Answer: D Question: 580 Which of the following commands is used to rebuild the man page database used by the hatis command? A .man-k B .ssh -| jdoe4 example .boot.log D ./etc/wtmp B .wtmp B ./etc/sudoers C .whatis-r C .man --rebuilddb Answer: C Question: 581 A daemon unexpectedly terminates. what is the correct syntax for the user doe4?to login remotely to the examplecom server? A .com jdoe4:password Answer: B Question: 583 A hard drive is taking a long time to complete file copies.

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .3DES D .swapon B .jfs B .RC4 B .The hardware manufacturer’s Website Answer: B Question: 587 Which of the following file system types should be used for the /boot partition.org Website C . The Linux distribution does not provide any updates.cat /proc/timer/crond Answer: C Question: 586 A technician is installing hardware in a Linux system that is not supported by the current kernel.crond -q C .mkswap C . assuming it should be accessible from a minimal boot kernel? A .The kernel.mkswapfs D .ext3 D .org Website B .twofish Answer: B Question: 585 Which of the following commands can be used to verify if a specific cron job is scheduled? A .reiserfs Answer: B Question: 588 Which of the following commands creates a swap file system? A .DES C .ext2 C .The SourceForge Website D .The gnu.at -m B . Where should the user obtain a newer kernel? A .mkswapfsiso Answer: B Question: 589 Which of the following commands is used to obtain the summary of mounted hard drive partitions? Page 184 of 217 .crontab -l D .

pdf file will be displayed. B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . C . B .Change the home directory for the www user in the NIS passwd map.sar C .Serial port D .Remove the www userfrom the local passwd file.The flyer.fdisk-l Answer: A Question: 590 DMA (Direct Memory Access) is required for which of the following items? A . The correct location for the NlS ‘www’ user is /mnt/www.top B .pdf document using the following command: lpr flyer.ls-la D . 'ypcat passwd | grep www' reports: www:X:73:NIS www user:/mnt/www:/bin/sh Which of the following is the BEST solution to the problem? A .fsck C . D .netstat Page 185 of 217 . D .pdf Which of the following results will MOST likely occur? A .An error message will appear. Answer: B Question: 592 A user is trying to print a .Mouse B .Sound card Answer: D Question: 591 On an NIS client.The flyer. Answer: D Question: 593 A Linux technician needs to check the current resource utilization for processes. C . ‘cd ~www’ changes to /var/www.Keyboard C .The printer will print pages with strange characters.df B .pdf file will print correctly. Which of the following commands should be used? A .pmap D .Remove the www user from the NIS passwd map.Change the home directory for the www user in the local passwd file.

ifconfig eth0 down Answer: D Question: 596 A network problem occurs somewhere between a Linux PC and a remote Website.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 594 An administrator watches a Linux system boot and noticed an error with one of the hda partitions.ifconfig eth0 disable D .ifconfigeth0 off C .fsck C .so C .ifconfig disable B .xcopy D .netstat B .pathping D . The SSH daemon is confirmed to be running.netview C .sshd_config D .pam_deny. Which of the following commands will do this? A .traceroute Answer: D Question: 597 No users can connect via SSH (Secure Shell). Which of the following configuration riles may need to be edited to permit logins? A .top B .cp--disk Page 186 of 217 .dd B . Which of the following commands will accomplish this? A .debug D ./etcMnetd.cpd C . It went by too quickly on the screen for the administrator to read the details. Which of the following commands will help locate the point of failure? A .conf Answer: C Question: 598 A user wants to create an image of a system boot disk in order to copy it.demesg Answer: D Question: 595 An administrator wants to temporarily disable the eth0 network interface on a server. How can this information be recalled? A ./etc/passwd B .

4. B .conf Answer: A Question: 601 A user created the following grub. not (hda1)./etc/pam. D .0).4. D .4.route B .22.The command restricts permissions to the superuser.The command runs with permissions of the superuser.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 599 The /usr/bin/passwd command has the following permissions: -r-s--x--x 1 root root passwd Which of the following will occur? A . C . Answer: D Question: 602 An administrator needs to adjust the MTU (Maximum Transmission Unit) value on an Ethernet interface./etc/login.The root partition should be mounted “rw”.The correct path should be /boot/vmlinuz-2.conf C . Answer: C Question: 600 Which of the following configuration files should a Linux administrator edit in order to restrict the use of su to a single group? A .22) root(hda1) kernel /vmlinuz-2.conf file.The command will have the sticky bit set.gz title Linux Server (2. Which of the following commands can be used to change the current MTU value to a new one? A . B . C . not “ro”./etc/sysctl.The splashimage should not be gzipped.netstat Page 187 of 217 .xpm. default=0 timeout=10 splashimage=(had l)/grub/splash.d/su B .The hard drive label should be (hd0.The command would use SSL (Secure Socket Layer) by default.22 ro root=LABEL=/ hdc=ide-scsi rhgb initrd initrd-2.22 Which of the following is wrong with this file? A ./eft/environment D .4.

/opt/kernel D .passwd C . Which of the following will happen the next time the system boots? A . When it is compiled it asks for the location of the kernel sources. B .The kernel will halt mounting the root file system.1 user 1 staff 0 8 May 11:45 test.It maps a MAC address to a hostname.It maps a hostname to a MAC address.iptables D .txt A . but neglected to update /etct/stab. Answer: C Question: 605 Which of the following tools can be used to identify poor password usage from the user by auditing password usage? A .The root file system will be corrupted.chmod 013 test.txt D . Page 188 of 217 . Where are the kernel sources normally located? A ./usr/kernel/src Answer: A Using octal permissions./usr/kernel C .ifconfig Answer: D Question: 603 A new driver version has been downloaded./usr/src B .txt B .txt to have the following access privileges? -rwxr----. C .crack Answer: D Question: 606 A Linux administrator converted the root file system from ext2 to ext3. D .chmod 310 test txt C .txt Answer: A Question: 604 Which of the following is the tunction of the ARP (Address Resolution Protocol)? A .chmod 740 test.It maps a MAC address to an P address.crackpasswd D .chmod 047 test .It maps an IP address to a MAC address. how would a user modify the file test.crypt B . B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .

tar.run rpm B .run configure.move the extracted directory to /usr/local/application Answer: C Question: 609 Which of the following services commonly uses Port 25? A . How can the detailed file information in the file be viewed without extracting the contents? A .0.chmod u+x <filename> Answer: D Question: 608 An administrator needs to add a new application to an existing Linux machine. After extracting the file.50 D .rarp 192.16a.run apt-get C .0.SMNP Answer: C Question: 610 Which of the following commands can be used to provide a reverse lookup of an IP address? A .chown 755 <filename> C .SMTP D .POP3 C .0.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .tar B .riockup 192.tar C .50 Answer: B Question: 611 A Linux user has a file named backup. make install D .tar lf backup.0.gz”.tar tf backup.The system will boot as normal. Answer: D Question: 607 Which of the following commands enables a user to make a newly-created shell script executable by only its owner? A .hostname-r 192. which of the following is the next step in installing the application? A .tar. except journaling will be disabled.50 B ./<filename> B . D .The file system will be automatically detected as ext3.50 C . The application is available in source code and distributed in a file called “application.dig-x 192.168.FTP B .tar lvf backup tar Page 189 of 217 ./configure <filename> D . make.168.168..

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .0 socket.rpm -v samba.255.255 D .87 netmask 255. Answer: C Question: 615 Which of the following commands can be used to confirm checksums on the Samba package? A .Configure local X sever to allow the remote host.1.255.rpm Answer: A Question: 616 Which of the following is used to register a new printer with CUPS on a system using default settings? Page 190 of 217 .255.The kernel module loader is not available.192 broadcast 192.tar tvf backup.168.255 C .1.rpm -i samba.168.87/26.ifconfig eth0 up 192. B .87 netmask 255.168.168.ifconfig eth0 up 192.87 netmask 255.1.255./dev/sda does not exist.rpm -V samba.255.ifconfig eth0 up 192. B . D .255.rpm -c samba.168.255.Use SSH (Secure Shell) to forward X11.168.1. The default gateway’s P address is 192.1.Install an X server on the local client.rpm D .A USB 2.1.The USB memory stick is not formatted.128 B . The clients TCP/IP settings are 192.1.168. C . What command must be entered on the client machine to enable communications to the Internet? A .rpm C .Install a secure version of X.255.ifconfig eth0 up 192.rpm B . Answer: A Question: 614 A USB memory stick is plugged into a server. C .tar Answer: D Question: 612 A user is unable to access the Internet from their Client.1 netmask 255. but the mount command generates the following error: mount special device /dev/sda1 is not a valid block device Which of the following is the MOST likely cause of this error? A . D .0 device was plugged into a USS 1. How can this be made secure? A .1.0 Answer: A Question: 613 A Linux user wants to access the X interface on a remote server.

MD4 B .edit /etc/cups/printcap Answer: C Question: 617 Which of the following commands will secure a script file so it could be modified only by the owner? A .0.named.cups --add-printer C .chmod 777 file Answer: A Question: 618 Under which of the following sce/varios should an administrator initiate single user mode? A .conf D ./usr/config C .chmod 770 file C .To run fsck on a damaged filesystem D .To check the root and postmaster mail boxes Answer: C Question: 619 A compary currently has tour Linux servers and wants to Install a fifth server to perform user authentication.conf Page 191 of 217 . Which of the following files should be edited to ensure the server will return answers for this zone? A .conf Answer: A Question: 621 An administrator wants to add a new forward DNS Zone file to the Linux DNS server.To reset a forgotten user password C ./etc/users.0.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .chmod 077 file D ./usr/default. Which of the following is a “Id protocol for centralized user authentication? A .cupsct B .To suspend a user account B .1:631 D .chmod 700 file B .conf B ./etc/skel B .3DES Answer: B Question: 620 Which of the following contains user default configuration files and directories? A .dns.lynx http://127.LDAP C .SHA1 D .

The user johnd is removed from the system and all data in the home directory is moved to the /home/deletedusers directory.nameserver.In -s help help old B .jobs 0 C .In -s /tmp/help.A hostname C . Answer: B Question: 624 Which of the following commands is used to show all of the root processes running on a system? A .conf D .old Answer: B Question: 623 Which of the following will happen when the following command is run? userdeI johnd A.psroot B . The user johnd is removed from the system while keeping all of the data in his home directory.A program name D .no_root_squash) In this file.In -v /home/joe/help /tmp/help. The user johnd is removed from the system.old C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .conf Answer: B Question: 622 Which of the following commands can be used to create a link to the file /home/joe/help in /tmp/help.old? A .ps -au root D .cat /proc/sys/proc Answer: C Question: 625 The /etc/exports file on a Linux system contains the following entry: /var logger(ro. The user johnd is removed from the system and all of his data is moved to the /var/archive directory.In -s /home/joe/help /tmp/help.old /home/joe/help D .resolv.A directory or filename Answer: B Question: 626 Page 192 of 217 . C. deleting all of the data in his home directory B.A username B . D. the name ogger is which of the following? A .

The system should boot into multi-user mode with a non-graphical interlace.conf.It disables the function keys. Answer: C Question: 630 Page 193 of 217 .inittab id:5:initdefault: B . Alter further troubleshooting.ipv4.ipv4. Which of the following commands will enable routing? A .It provides the ability to create special characters. B .conf.sysctl -a net.sysctl -n net.sysinit.conf initdefault 5 Answer: B Question: 628 A Linux server has been configured as a gateway to allow local LAN access to the Internet. it has been determined that IP forwarding is not enabled on the Linux server.It disables unused keys based on the language option selected.forwarding = 1 Answer: C Question: 629 What does enabling the “dead keys” option during installation do? A .$EXECUTABLES Answer: A Question: 627 A Linux machine always reboots shortly after the boot loader completes. the system returns the error command notfound Alter confirming gcc is installed on the system. which file needs to be edited and what is the correct parameter? A .$PROMPT C .forwarding = 1 C . Users can ping the gateway address but cannot access the Internet. which environmental variable must be modified to correct this problem? A . C .sysinit.conf initdefault 3 D .$DISPLAY D .eth0. In order to correct this.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When the command ‘gcc’ is run in a newly created directory.route add IP_FORWARD eth0 B .echo “1” > /proc/sys/netfipv4/ip_forward D .It enables application shortcut keys.$PATH B . D .inittab id:3:initdefault: C .

mail B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A telecommunications controller will be installed in a Linux server.chroot -so C . C .Check the /etc/sysconfig directory.showmount e jupiter D .smtpd C .wend C .mailq D .sudo --single Answer: A Question: 633 Which of the following commands allows a user to view undelivered messages on a server using sendmail as the MTA (Mail Transport Agent)? A .su --single D .ls jupiter B .end B . The model number is available to identify the card. Answer: D Question: 631 Which or the following commands lists the rile systems available for the NFS (Network File System) server upiter? A . B .showmount -e jupiter Answer: D Question: 632 Which of the following commands could an administrator use to switch to single-user mode without rebooting the system? A .Check the government’s telecommunications Website.init 1 B .ls -l jupiter C .done D .Check the /dev directory. D . How can the Linux technician confirm that the device is supported by the Linux distribution? A .sendmail -bd Answer: C Question: 634 Which of the following is used to terminate a hue loop in a BASH shell? A .elihw Answer: C Question: 635 Page 194 of 217 .Check the Linux distribution’s Website.

cat /proc/ide/raid C .Use op to list processes ranked by CPU utilization.cat instructions | awk ‘/PC/ print computer’ Answer: A Question: 637 Which of the following commands is used to check the status of a sottware RAID? A .mkraid --verify Answer: A Question: 638 A system is running slowly and the administrator wants to find the process that is using the MOST resources. Which of the following will accomplish this? A .sed s/PC/computer/g instructions B . Answer: A Question: 639 Which of the following packages would be selected during installation to provide a Web server? A .chown -u +wx Answer: C Question: 636 How could a user substitute all instances of C with omputer in a file named instructions and display the results in the terminal window? A .Use is tree to list processes with the highest foreground priority. John currently has read-only permission.chmod u+wx D .Squid C .chown-f B . Which of the following commands can be used to add write and execute permissions for him without changing anyone else’s permissions? A .Apache D .Use ice -I -n 1 to list the process with highest CPU utilization.sed -s PC -r computer instructions C .Mozilla Answer: C Page 195 of 217 . C . and execute permissions to the following file: /home/joh n/resume.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user named ‘john’ needs to have read.cat instructions | awk Computer D . D .Use obs to list CPU-intensive processes in order.chmod 700 C . B .cat /proc/mdstat B .Bind B . write.mkraid --status D .

auth. routing.netsetup D .11 D .err -print C .auth. and DNS settings for other devices on a network? A . which of the following commands can be used to find the MAC address of that host? A .nslookup D .arp B .Blowfish B .conf would BEST accomplish this? A .TLS (Transport Layer Security) Answer: D Question: 641 Which of the following services could be used to provide remote configuration of the networking address.SSH (Secure Shell) C .PGP (Pretty Good Privacy) D .dhcpd B .auth.dig C . Which of the following entries in /etc/syslog.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 640 Which of the following is used to secure http communications? A .err | lpr B .routed C . Which of the following is the default ID on a SCSI controller card? A-1 B-7 C .traceroute Answer: A Question: 644 A Linux technician is installing a new SCSI tape drive.netconfig Answer: A Question: 642 Company security policy requires that all authentication errors be logged to a printed hard copy.auth.err +/dev/lp0 D .err -/var/log/auth -Ipr Answer: A Question: 643 If the IP address of a host on the network is known.16 Answer: B Page 196 of 217 .

the user decides to test the DVD drive to ensure it was installed properly. which of the following device files would likely be used to access it? A .testparm B .Ensure that /mnt/dvdrom has an entry in /etc/fstab. D .grpck D ./dev/usb/auer0 Answer: A Question: 647 A Samba server is not functioning properly.LOOP device D .pwd B . Which of the following actions will MOST likely solve this problem? A . the error “mount: no medium found” is returned.chkconfig samba Answer: A Question: 648 The administrator sees this line in /etctrstab: /dev/md0 / ext3 defaults 0 1 Which of the following BEST describes the /dev/mdO device? A .SCSI device C .RAID device Answer: D Question: 649 Which of the following can be used to determine if the entries in /etc/shadow are corrupt? A .Issue the command “mount /dev/dvdrom /mnt/dvdrom”.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 645 After setup has completed. Answer: D Question: 646 When a USB memory stick is used on a Linux server./dev/sda B . Which of the following commands should be run to verify that the configuration is correct? A .pwck C . After issuing mount /mnt/dvdrom.ATA device B . C ./dev/usb/hd1 D . then re-issue the mount command.passwd Page 197 of 217 ./dev/ram0 C . B .smbcheck C .smbd --check D .Insert a DVD into the drive.Create the directory /mnt/dvdrom.

255. the administrator added a rule to deny traffic on Port 22. D .routeadd-net 192.100.0 netmask 255.192 gw 192.168. Which of the following commands can be used to confirm the operating system recognizes the drive ? Page 198 of 217 .200.255.100.5 C .route 192. Which of the following would resolve this problem? A .168.5 B .160. B .168.200.255.168.200.255. repositoryuser cannot login to the FTP server.0/25 to 192.On the core network router C .200.routeadd-net 192.From the system console. Which of the following is MOST likely the problem? A .There is no entry in /etc/exports for repository user’s home directory.168.100.100.200.5 A .There is an entry in /etc/ftpusers for repository user.168.255.255.Near the system administrator’s workstation Answer: A Question: 654 A workstation user is unable to mount a CD-ROM drive.0 netmask 255.SSH to Port 23 and remove the rule C .255.5 Answer: C Question: 653 When a new Snort system is installed. SSH is now no longer accepting connections.Remove the rule before it is activated D .On the network perimeter B .128 gw 192.5 D .0 netmask 255.There is an entry in /etc/shells for repository user’s shell.100. C . The following entry in /etc/passwd corresponds to this user: repositoryuser:x:502:502::/home/repositoryuser:/bin/fales Upon testing.route 192.255.168.The repositoryuser is not in the FTP group.Restart the SSH service B . Answer: B Question: 651 When remotely administering a Linux machine using SSH (Secure Shell).168.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 650 A new user must have local FTP access but not interactive login access.0 netmask 255. where should the system be placed on the network? A .On an isolated network segment D .192g w 192.126 gw 192. remove the Port 22 rule Answer: D Question: 652 Which of the following commands would ensure thatthe Linux serverwould send packets destined for 192.168.

cat fstab | grep CD D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .The new kernel was not compiled with ipchains support Answer: D Question: 656 A new administrator is asked to reconfigure a Linux machine. After upgrading to a 2. Answer: A Question: 657 Which of the following is the BEST security practice for compiling the package from the source? A . C .in C .init B .The ipchains package needs to be upgraded C .klogd Page 199 of 217 .The 2.Config. D . The prior administrator did not give the root password to the current administrator. C .Compile and install the package as root.Reinstall the operating system.Compile and install the package as a normal user.Compile as root and install as a normal user.2 kernel.The old ipchains module needs to be loaded D .dmesg | grepCD C .make Answer: C Question: 659 Which of the following processes has the lowest PID (Process ID)? A .find cdrom B .Use view to edit the password file.Makefile D .Make B .4 kernel.Compile as a normal user and install as root.cat mtab | grep cdrom Answer: B Question: 655 A system administrator inherits a Linux system with a 2. D .Boot to single user mode.Run a password recovery utility. the ipchains commands no longer function.Config. Which of the following is the FIRST step the new administrator should do to reset the root password? A .4 kernel does not support ipchains B . B . Answer: B Question: 658 Which of the following is the default file name for the ake command? A . B . Which of the following is the likely cause? A .

B . D .The user1 directory has 578 modes.snmp D .The userl entry was deleted from /etc/passwd. Which of the following commands should be used? A. C . mount mountd remount smbmount Answer: A Question: 663 Which of the following protocols is used by NIS? A .rpc B .User1 is a.0. D.kswapd D .ftp C .dhcp Answer: A Question: 664 The /var/log/messages file was deleted and the syslog daemon did not recreate it. Which of the following commands would remedy this situation? Page 200 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .1 onto the local mount point called /usr.syslogd Answer: A Question: 660 The administrator issues the ‘ls -l/home’ command and sees the following output drwxr-sr-x 2578 578 4096 Jun 13 13:50 userl The output indicates which of the following? A . B. Answer: D Question: 661 Which of the following virtual console sessions does XFree86 use by default? A-1 B-3 C-5 D-7 Answer: D Question: 662 An administrator wishes to mount an NFS (Network File System) export of the directory /usr located on 100.The userl directory is now owned by user 578. C.

logform /var/log/messages D .syslogd --recreate-file C .bash_logout D .man 2 passwd B .man-k 2 passwd D .ssh-keygen C .man 5 passwd C .:! ps -aux C . BASH reads and executes commands from which of the following files? A .~/.make ssh-key D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . Which of the following commands would the administrator run to create a new key? A .:#ps -aux B .logoff_now C .nslookup Answer: B Question: 668 Which of the following commands will display information in the manual page for the passwd file? A .~/.:// ps -aux D .man -k 5 passwd Page 201 of 217 . Which of the following commands will do this? A .dig B .bash_exit B .keygen-ssh B .make clean | ssh-key Answer: B Question: 666 A user is editing a file in vi and wants to run the command s ux without leaving vi.:cmd ps -aux Answer: B Question: 667 When a login shell exits.~/.~/.logoff_shell Answer: C Which of the following is a popular open source tool that is used for vulnerability assessment? A .nessus C .touch /var/log/messages B .slocate D .cat /dev/random > /var/log/messages Answer: A Question: 665 The administrator discovers that the SSH (Secure Shell) key may have been compromised.

mkIs -reiserts /dev/hda6 Answer: C Question: 670 The user of a Linux workstation reports slow network performance during heavy Web access. Which of the following commands tests an entire ext2 file system and repairs errors without user interaction? A ./var D . D .chmod 471 file B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 669 Which of the following is a valid command to format a partition as Reiser FS? A ./usr C . B .fdisk-V Page 202 of 217 .The network card is bad.The network card is disabled.chmod 761 file Answer: D Question: 673 A Linux disk indicates that it has errors./dev B . Which of the following is MOST likely the problem? A .mkIs.reiserfs/dev/hda6 C ./proc Answer: D Question: 672 The command is -l file is issued.The network card duplex setting is incorrect. The workstation is connected to an unmanaged switch.chmod 623 file C .reiserfs /dev/hda6 D .chmod 726 file D .The network card is in promiscuous mode. and the result is: -rwxrw---x 5 root wheel 8192 Jan01 21:00 file Which of the following chmod commands corresponds to the current permissions of the file? A .mkfs/dev/hda6 B . Answer: D Question: 671 Where is the ACPI (Advanced Control and Power Interface) power management dynamic information stored when devis is compiled into the kernel? A . C .

e2fsck-V D .Afiag oroption code D .printq -a Answer: A Question: 675 Which of the following commands can be used to display the location of all the setuid regular files on /mnt? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B .A terminal id B .find /mnt -type f -perm -u+s -ls Answer: D Question: 676 The following line is found in /etc/inittab ~ 3:2345:respawn:/sbin/mingetty tty3 ~ What is the meaning of the second field in this conflguratlon line? A .e2fsck -y Answer: D Question: 674 Which of the following commands will allow a Linux administrator to view waiting print jobs for all printers? A .NFS (Network File System) Answer: A Question: 678 Page 203 of 217 .printq -A D .NIS B .e2fsck-a C .Atimeoutvaiue C .find /mnt -setuid -ls C .Samba D .find fmnt -suid -type f -ls D .lmapd C .A list of runlevels Answer: D Question: 677 Which of the rollowing packages is needed on a server to allow other Linux workstations to authenticate local users through the server? A .lpq -A C .lpq-a B .find /mnt -mode s -ls B .

www.linuxdoc.org C .Internet search engine B .Linux distribution Website D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A RAID controller is to be installed in Linux as the boot device. Which of the following sources will BEST confirm that the hardware is supported by the version of Linux being installed? A .RAID manufacturer’s Website Answer: C Question: 679 Which of the following commands will create the directory /home/gawd/tools/security regardless of the existence of its parent directories? Page 204 of 217 .

ssh/sshd_config C .mkdir -p fhome/gawd/tools/security D .vmstat--time=’1 min’ 10 Answer: A Question: 684 Which of the following commands can be used to ensure that all the files in /home/user and its subdirectories are accessible only by the owner of /home/user? Page 205 of 217 .Add enyLogin to /root/.vmstat-10-1min C .Add ermitRootLogin no to /etc/ssh/sshd_config Answer: D Question: 683 The system administrator wishes to view vmstat output once every 10 seconds for the next minute.15 Answer: C Question: 681 After a company-standard installation.ssh/sshd_config B .14 D . steep 60 D .Add ermitLogin no to /root/.mkdir -m /home/gawd/tools/security C .Xmodmap B . a user with a Swedish keyboard has the English character set loaded.md -m /home/gawd/tools/security B . Which of the following commands accomplishes this? A ..Add enypootLogin to /etc/.ssh/sshd_config D .conf C .keyb.vmstat 10. Which of the following configuration files should be edited to support the specific country keyboard? A .bash_profiles Answer: C Question: 682 How should a Linux administrator prevent the root user from logging in remotely via SSH (Secure Shell)? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .vmstat 10 6 B .XF86Config D .mkdir --makepath /home/gawd/tools/security Answer: C Question: 680 Which of the following IRQs is commonly used by /dev/hda? A-3 B-7 C .

ifup eth0 subnet_mask=255.0 up B .chmod u=rw filename Answer: A Question: 687 An administrator would like to test a newly installed printer.RAID 5 Answer: A Question: 686 Which command would set a file’s permissions to the following? rwxr--r-A .lpr-P/dev/zero C .RAID 1 C .RAID 0 B .255. It is determined that an interface’s subnet mask is incorrect.chmod 755 filename C . Which of the following commands would accomplish this A .if eth0 subnet 255.chmod 711 /home/user B . Which of the following commands will correct this issue? A .ethtool eth0 subnet_mask=255.0 D .chmod 700 /home/user C .255.255.RAID 3 D .0 Answer: B Question: 689 Which of the following services is commonly started from xinetd? Page 206 of 217 .0 C .print -check B .chmod 744 filename B .255.255.lpr -test </dev/zero Answer: C Question: 688 Ping requests to a network gateway fail.ifconfig eth0 netmask 255.255.255.chmod o+x filename D .255.chown user /home/usert/* D .chown -R user /home/user Answer: B Question: 685 Which of the following RAID configurations is BEST for a streaming-video server where reliability is NOT important? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .echo testing | lpr D .

Id --reload D .Remove the faulty drive from the system. the primary IDE master has a hardware failure.find / -n error.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . D .ldconfig B .crontab -v D .Use Disk Druid to repair the array.find / -daystart -amin 60 -name error. Now the system will not boot.log Answer: C Question: 693 Alter installing or updating a dynamically linked library.Use fdisk to repair the partition table. How can this tile for the error. C .so. but no location is provided.fingerd Answer: D Question: 690 Which of the following commands can be used to view a user’s crontab entry? A .kill -HUP1 Answer: A Question: 694 Page 207 of 217 .log B .httpd C . the technician needs to reload /etc/ld.ldupdate C .log should be viewed.find -name error. Which of the following programs should be run? A .cronview B . B .Run fsck on the faulty drive.conf and refresh the dynamic linker’s cache so new programs that need the new library can run.log be found effectively? A .log C .log D .crontab -l C .smbd B .crontab -e Answer: B Question: 691 In a Linux software RAID 1 array created during the installation process.find / -name error.sendmail D . Which of the following will allow the system to boot properly and salvage the information? A . Answer: D Question: 692 An application is tailing and indicates that the error.

Which of the following is the MOST likely cause of this error? A . which of the following commands should be issued? A . Answer: C Question: 697 If a user wishes to monitor the last three lines of the log file messages.log B .swap D . B .watch -f -s 15-n 3 messages.037 B . C .The server share needs to specify no_root_squash.log Answer: B Question: 698 A Linux specialist wants to check which shares are offered by a Windows server.The server needs to allow NFS UDP packets.log D . Which of the following commands is used to perform this task? A .log and update it every 15 seconds.follow -f -s 15-n 3 messages.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following settings of the UMASK would cause new files to be created with mode 640? A .ext3 C .smbclient B .listshares D .vfat B .The server is not allowing the client to connect.tail -f -s 15 -n 3 messageslog C . D .367 D .smbserver C .sar -f -s 15 -n 3 messages.showshares Answer: A Question: 699 Page 208 of 217 .The directory needs to be remounted as NFSv3.reiserts Answer: C Question: 696 The root user receives a ‘Permission denied’ error message when trying to write files to an NFS (Network File System) mounted directory.177 C .640 Answer: A Question: 695 Which of the following tile systems are compatible with a partition that is typed as 82? A .

Place the command in the /etc/rc. C .File server C . Answer: C Question: 703 A technician needs to extract the entire archive ‘backup .local file.Place the command in the /etc/sysconfig/startup.uninstall exim C .rm -r exim B .tar.The system is unpatched.The Apache Web server is running.Copy the command to the /boot directory.tar. Which of the following commands could be used to uninstall the software? A . D .Place the command in the /etc/rc.There are too many users.boot file.tar.bz2 Page 209 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A Linux administrator has decided to remove a software package called exim.rpm --erase exim D .Firewall B . B .rpm. C . Answer: A Question: 702 How would an administrator ensure that the command /usr/local/radius/startrad.Database server D .pl was executed atter each reboot? A .Streaming media server Answer: B Question: 701 A Linux server may have vulnerabilities if which of the following occurs? A .bz2’ Which of the following commands will accomplish this? A .cfg file.bz2 B . D .The SSH (Secure Shell) is disabled.rpm --uninstall exim Answer: C Question: 700 A customer requires that the following packages be installed on a server quota raidtools Samba Amanda yp-serv For which of the following purposes is this server MOST likely to be used? A .tar xZa backup.tar xjf backup. B .

168.displaytmp Answer: A Question: 707 A user wants to set up a parallel port printer on the workstation’s second parallel port.tar x--bz2 backup.wshow C .bz2 Answer: A Question: 704 A Linux user wants to create a hard link named ile2 in the current directory that points to /usr/var/file.1.0.168.route remove -net 192.0 192.255.route del -net 192.0 C . Which of the following device identifiers needs to be used during configuration? A .243 0.0 0 0.3.255.0./dev/prn2 D .1.0 gw 192.3.0 255.0.168.0 255.route remove 192.tar.In /usr/var/file file2 C .168. Which of the following commands can be used? A .255.0.168.3.168.255.0 netmask 255.3.0 192.168.edit /proc/net/netstat B .showtmp D .In -h file2 /usr/var/file D .bz2 D .0 0.0 netmask 255.tar xbf backup./dev/ecpl Answer: A Page 210 of 217 .0 Gateway 192.1.255.0.3.1 D .255.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .255.168.168.0/24 to the routing table as shown below: Destination 192.tar./dev/epp2 C .1 Genmask 255.In -h /usr/var/file file2 Answer: B Question: 705 The administrator has added a specific route for 192.0 Flags UG U UG Metric 0 0 0 Ref 0 0 0 Use 0 0 0 Iface eth0 eth eth0 Which of the following is a valid method for removing the route? A ./dev/lpl B .255.166.0.0 gw 192.255.Last B .In file2 /usr/var/file B . Which of the following commands is designed to display the contents of this file in human-readable format? A .255.243 Answer: D Question: 706 An administrator is seeking to view the information contained in the wtmp log file.1.1.

text Answer: C Question: 710 The DNS administrator needs to change the IP address of the primary Webserver.Change the Webserver TTL (Time-To-Live) record to 5 minutes.diff --rpm <package_name> <installation_file> Answer: B Question: 712 A new shell command generates too much output to read on the screen and does not write to a log file. Answer: D Question: 711 A new RPM package returns a large number of errors and has never run successfully.rpmdb --dump rpmlist.limits -t 90 B .Notify the domain registrar of the change in advance.Change the Webserver PTR record to the new hostname.Use on the command line Answer: D Page 211 of 217 .rpm -V <package_name> C .Update /etc/resolv. B .rpmdb -v <installation_file> D .text B . D . Which of the following would capture the output for evaluation? A .Reduce MOG_LEVEL=6 in /etc/syslog.text C .conf on the Webserver.echo 90 >/proc/me/limits/time Answer: B Question: 709 The system administrator wants to create a list of all of the RPM packages installed on a server in alphabetical order.rpm -qa %-1 .ulimit -t 90 C.Run the command as a daemon B .rpm -q --dump rpmlist.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 708 Which of the following BASH shell built-in commands can be used to apply a CPU time limit of 90 seconds on the current shell session? A .setlimit-t90 D . Which of the following commands should be run as a FIRST step to troubleshooting this problem? A .[A-Z]% > rpmlist. Any down time would have a major impact. C .Pipe the output to the cat command D . Which of the following is a quick and easy way to do this? A .text D . Which of the following is the BEST way to minimize the down time? A .rpm -q -a sort> rpmlist.conf to a lower number C .verify <package_name> B .

new Answer: C Question: 715 The system administrator suspects the machine has been compromised and would like to search the system for any setuid programs.mkfs -t ext3 -j /dev/hda2 D .new .help.e2image -j /dev/hda2 C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 713 Which of the following commands could be used to convert the ext2 file system on /dev/hda2 to use the ext3 file system? A .locate --suid D .Error Unexpected input “$“ Answer: C Question: 717 The named service needs to be secured.help.mvhelp. Which of the following would BEST accomplish this? Page 212 of 217 .e2label -t ext3 /dev/hda2 Answer: A Question: 714 Which of the following commands can be used to hide the file “help.new . If the grep result is analyzed by the following logic: if [ “$?“ = 0 ] then echo BLUE else echo GREEN fi Which of the following will be the scripts output? A .search u+s C .new D .tune2fs-j /dev/hda2 B .new C .GREEN D .atrrib -h help.chmod 4000 help. and grep has returned an error.cp help.new B . Which of the following commands would accomplish this? A .find/ -perm -4000 Answer: D Question: 716 A script set to run using /bin/sh has executed a grep command.BLUE C .rpm-Va B .End B .new”? A .

255.copy B . the administrator discovers the machine does not have a bootable CD-ROM drive. Which of the following DOS utilities would the administrator use to write a diskette image onto a 3.5. Which of the following ifconfig commands will do this correctly? A .linload D .Run named as root.Run named in a chroot jail. C .Change the root password.168. The workstation cannot ping a second server at 192. B .4. D .xcopy C .168.3. Answer: B Question: 718 A technician wants to allow the computer to sniff incoming and outgoing packets on the Ethernet interface. The administrator has verified that the default gateway setting is correct.168.1.4.128. Which of the following is the problem? A .4.The Ethernet card is faulty.250.Run named on a non-standard port. Answer: D Question: 722 Page 213 of 217 .Change the root application.255.168.The netmask is wrong and should be changed to 255.ifconfig eth0 listenall Answer: A Question: 719 A Linux workstation that has been configured with the IP address of 192. D . C . B .255 . C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .ifconfig eth0 promisc B .ifconfig eth0 unicast C .Run named in UDP mode only. D . B .The Ethernet cable is faulty.5” diskette? A .The netmask is wrong and should be changed to 255 . Answer: C Question: 720 After downloading a new Linux distribution for a new installation.rawwrite Answer: D Question: 721 Which of the following is the function of the chroot command? A .0.255.235/26 and a default gateway of 192. It can ping a server at 192.Change the root login name.ifconfig eth0 multicast D .Change the root directory for the shell.

which of the following needs to be done to implement the changes? A . which of the following directories would MOST likely be on a separate partition? A .Run the command “tune2fs --nosuid /var” C .agetty C ./usr B . How would this be accomplished? A .Add an entry to the options list in /etc/sysctl.find *ntp B .loadlin C ./home D .find /etc/ntp D .lilo./var C .find /etcr/* ntp* Answer: D Question: 725 When a file server is installed./local Answer: C Question: 726 A Linux administrator wants to disable the use of setuid and setgid files for the /var file system.lilo B .portmap D .Add an entry to /etc/setuid.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following programs could be used to display a remote login prompt on a serial line or terminal? A .Add an entry to the options list in /etc/fstab D .sshd B .find ntp* C .conf D .fdisk-mbr Answer: A Question: 724 Which of the following commands can be used to find all instances of files in the /etc directory containing tp in the file name? A .conf B .console Answer: B Question: 723 After the LILO configuration file is edited.conf Answer: C Question: 727 Page 214 of 217 .

The hard drive does not support Linux.guestok = yes D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A workstation is unable to browse a Website by name./etc/named./etc/nameserver. Which of the following file systems was MOST likely used? A ./etc/init. Which of the following files must be checked to confirm DNS settings? A .The computer BIOS has the wrong boot order.d B .conf C . an automatic disk check is run and numerous mode errors are reported and corrected. Which of the following MOST likely caused the problem? A .anonymous = yes Answer: C Question: 730 A user who is installing Linux inserts the install CD-ROM and then reboots the computer.ext2 C . D ./etc/resolv. B .users = * B .ext3 D .jfs B .conf Answer: B Question: 728 A Linux system is powered down unexpectedly.printall = yes C .The MD5 sum is erroneous. After reboot.hid Page 215 of 217 .The user needs to install a Windows driver. the computer boots into Windows.ReiserFS Answer: B Question: 729 The following is part of the Samba configuration file: [aprinter] path = /usr/spool/public read only = yes printable = yes Which of the following lines needs to be added to the file to allow print access to everyone? A . C . Answer: C Question: 731 Which of the following modules is a dependency module for PCMCIA card services? A . However.conf D .

adm B. DAC C. None of the above. nobody D. C. The partition table has become corrupt and needs to be repaired. Which of the following is the pAt boot time.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B . RBAC C. DAC D. Answer: A Question: 735 Which of the following commands will mount a USB flash drive successfully in Linux? A. Answer: C Question: 734 Which access control model uses predefined access privileges control access to a resource? A. root C. B. mount -t usbfs /dev/usb001 /mnt/usb C. mount /dev/uda1 /mnt/usb D.yenta_socket Answer: D Question: 732 Which of the following group-level permissions is needed to create user accounts? A. The file system has become corrupt and needs to be repaired.tulip C . Page 216 of 217 . Predefined access privileges. mount /dev/hde1 /mnt/usb Answer: A Question: 736 At boot time. None of the above.parport_pc D . RBAC D. Which of the following is the problem and how is it corrected?roblem and how is it corrected? A. the computer reported that there are problems with inodes and blocks. MAC B. The boot sector is corrupt and needs to be replaced. B. the computer reported that there are problems with inodes and blocks. MAC B. ntadmin Answer: B Question: 733 Which of the following access control models uses roles to determine access permissions? A.

B End of Document Page 217 of 217 . The drive is configured using an improper file system and needs to be reformatted.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Answer: A.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.